Re: Lost the "require" meny alternative with Gimp upgrade

2008-10-16 Thread Leslie Jensen



Warren Block skrev:

On Thu, 16 Oct 2008, Leslie Jensen wrote:

I upgraded Gimp to version 2.6.1 and now I do not have the require 
(for scanning) meny choice anymore.


"Acquire", maybe?


Yes, sorry about that.



Any ideas on how to get the function back.

I can scan using xscanimage but it takes more steps to get the scanned 
image into Gimp.


In gimp 2.6.1, the SANE scanner plugin is on the File/Create menu.


Thank you :-) I've found it

/Leslie




-Warren Block * Rapid City, South Dakota USA

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Frank Shute
On Fri, Oct 17, 2008 at 09:59:17AM +1100, Edwin Groothuis wrote:
>
> > In the last hour, I've received over 200 legitimate bounce messages
> > from email services as a result of someone having used or worse is
> > using my email address in spam from multiple windows machines and ip
> > addresses.
> 
> When this happens I enable the "move all messages from mailer-daemon
> to /dev/null" rules in procmail for a day or two. And curse at the
> people who originated the original spam...
> 

I use a similar approach to Edward's.

My old domain used to get hammered with backscatter which basically I
had no choice but to accept. I was on a pop3 catch-all.

If I had a regular amount of backscatter (<100), I'd accept it & then
pass it to procmail.

I found (I don't know if the OP did too) that the backscatter was
generally addressed to a non-existent user, so it was easy to write
rules to filter it out and send it to the bit-bucket.

I also found that the backscatter was commonly addressed to people
like frankn@ - close but no cigar. The following filtered out that
crap:

:0:
* ^To:\ <[<>[EMAIL PROTECTED]
spam/new

:0:
* ^To:\ <[EMAIL PROTECTED]
spam/new

In the worst case scenario, I'd find that I'd get thousands of
backscattered mails (the swine must have been sending millions of
messages purportedly coming from me).

In this case I'd just delete all my mail off the popserver with a
script. Yes, I might lose a few genuine emails but when I had
thousands of backscattered mails, they'd come in the space of a couple
of hours.

My ultimate sanction was eventually getting a new domain (I know it's
admitting defeat).

I now find that I get very little backscatter on my old domain and I
haven't had a mass mailing effort from it for some time.

Best of luck!

Regards,

-- 

 Frank 


 Contact info: http://www.shute.org.uk/misc/contact.html 

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IPFW UID match questions

2008-10-16 Thread Kalpin Erlangga Silaen

Jeremy Chadwick wrote:

The problem is that you're not allowing incoming connections to
personal_ip on TCP port 113 (ident/auth).  Add this rule:

/sbin/ipfw -q add 18680 allow tcp from personal_ip 113 to any out

You can also replace "113" with "auth" or "ident" if you want (see
/etc/services).
  

thank you very much. It's solved.

Regards,


Kalpin Erlangga Silaen

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IPFW UID match questions

2008-10-16 Thread Jeremy Chadwick
On Fri, Oct 17, 2008 at 09:10:05AM +0700, Kalpin Erlangga Silaen wrote:
> Dear all,
> 
> I tried to implement IPFW rules like below on my shell server:
> 
> /sbin/ipfw -q add 18600 allow tcp from any to personal_ip in
> /sbin/ipfw -q add 18650 allow tcp from personal_ip to any out uid kalpin
> /sbin/ipfw -q add 18660 allow tcp from personal_ip to any out uid root
> /sbin/ipfw -q add 18670 allow tcp from personal_ip to any out uid nobody
> /sbin/ipfw -q add 18700 deny tcp from personal_ip to any out
> 
> I hope with this rule, only user kalpin could be use the vhost
> personal_ip. Below is brief description
> 
> line 1 will allow all tcp incoming packets into personal_ip
> line 2 will allow tcp outgoing packets from personal_ip to anywhere if
> match uid kalpin
> line 3 same with line 2 if match uid root (to response identd request
> from IRC Network if identd run as root)
> line 4 same with line 3 if match uid nobody (to response identd request
> from IRC Network if identd run as fall into nobody)
> line 5 will deny all tcp outgoing packets
> 
> But, IRC Network still could not get ident response from my server. If I
> removed line 5, then IRC Network get identd response. My identd process is:
> 
> root 63932 0.0 0.1 3136 1028 ?? Ss 1:46AM 0:00.03
> /usr/local/sbin/oidentd -C /usr/local/etc/oidentd.conf
> 
> Is there anything else should be done to fix this problem?

The problem is that you're not allowing incoming connections to
personal_ip on TCP port 113 (ident/auth).  Add this rule:

/sbin/ipfw -q add 18680 allow tcp from personal_ip 113 to any out

You can also replace "113" with "auth" or "ident" if you want (see
/etc/services).

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Radius Authentication

2008-10-16 Thread Peter Boosten


MattAD wrote:
> I would just like to know if anyone on earth has been able to get the
> pam_radius module working on FreeBSD, using a windows domain username
> through ssh... ??? This has become a mystery to me. My /etc/pam.d/sshd
> config looks like so:  

I don't have a direct answer to your question, but we use tac_plus with
the RADIUS extension to authenticate from our IPS environment to a
Windows 2003 domain, and there are two things I vaguely remember from
that setup (maybe they apply to your setup as well):

- when authenticating we have to use the complete login name, including
domain info: [EMAIL PROTECTED]
- we had to switch 'Store passwords in reversable form' (or something
like that - in Windows that is) to be able to authenticate. The first
password is stored that way after a password change.
- we discovered that some password do not work: passwords with a "+"
sign in it, but I don't know if that due to TACACS or RADIUS.

Hope it helps.

Peter
-- 
http://www.boosten.org
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: g4u and ftp

2008-10-16 Thread Steve Quinn
--- On Thu, 10/16/08, Jean-Paul Natola <[EMAIL PROTECTED]> wrote:

> From: Jean-Paul Natola <[EMAIL PROTECTED]>
> Subject: g4u and ftp
> To: "FreeBSD Questions" 
> Date: Thursday, October 16, 2008, 1:41 PM
> Hi all,
> 
> I'm having an issue trying to write to my ftp server
> from linux-
> 
> I just setup the ftp server with read and write access
> anonymous login
> 
> >From windows explorer no-problem from the mac's no
> problem- but when I try to
> upload an image using  g4u  (http://www.feyrer.de/g4u/) I
> get rejected by the
> MS ftp server 
> 
> 
> Im not sure why it doesn't let me any thoughts?
> 
> tia

Hi Jean-Paul

I use G4U very much myself so I've been there

G4U's defaults are reading/writing to a FTP user-account by the name of 
"install"

I hope that helps you out

Take care

Steve Quinn


  
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


IPFW UID match questions

2008-10-16 Thread Kalpin Erlangga Silaen
Dear all,

I tried to implement IPFW rules like below on my shell server:

/sbin/ipfw -q add 18600 allow tcp from any to personal_ip in
/sbin/ipfw -q add 18650 allow tcp from personal_ip to any out uid kalpin
/sbin/ipfw -q add 18660 allow tcp from personal_ip to any out uid root
/sbin/ipfw -q add 18670 allow tcp from personal_ip to any out uid nobody
/sbin/ipfw -q add 18700 deny tcp from personal_ip to any out

I hope with this rule, only user kalpin could be use the vhost
personal_ip. Below is brief description

line 1 will allow all tcp incoming packets into personal_ip
line 2 will allow tcp outgoing packets from personal_ip to anywhere if
match uid kalpin
line 3 same with line 2 if match uid root (to response identd request
from IRC Network if identd run as root)
line 4 same with line 3 if match uid nobody (to response identd request
from IRC Network if identd run as fall into nobody)
line 5 will deny all tcp outgoing packets

But, IRC Network still could not get ident response from my server. If I
removed line 5, then IRC Network get identd response. My identd process is:

root 63932 0.0 0.1 3136 1028 ?? Ss 1:46AM 0:00.03
/usr/local/sbin/oidentd -C /usr/local/etc/oidentd.conf

Is there anything else should be done to fix this problem?

Thank you


Kalpin Erlangga Silaen
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


kgdb of kernel issues FB7.0

2008-10-16 Thread Kayven Riese
I was running my FreeBSD 7.0-RELEASE (160GB HD) on this laptop:

http://www.monkeyview.net/id/965/fsck/dmesg/PB12001901.vhtml

Right now I am swapped out

http://www.monkeyview.net/id/965/fsck/torrent/p5120212.vhtml

but I have the problem disk mounted using this:

http://www.monkeyview.net/id/965/fsck/torrent/p5120226.vhtml

This is a much older disk with 60GB and
$ uname -a
FreeBSD  6.2-RELEASE FreeBSD 6.2-RELEASE #0: Fri Jan 12 11:05:30 UTC
2007 [EMAIL PROTECTED]:/usr/obj/usr/src/sys/SMP  i386
$

It makes clunking sounds sometimes, but for the most part it seems to run
fine.

Some diagnostics on the 160GB HD FB 7.0 that have been done:

# mount /dev/da0s4 /mnt/usr
# fsck_ufs -y /mnt/usr
** /dev/da0s4 (NO WRITE)
** Last Mounted on /mnt/usr
** Phase 1 - Check Blocks and Sizes
INCORRECT BLOCK COUNT I=2779162 (4 should be 0)
CORRECT? no

fsck_ufs: cannot alloc 871186332 bytes for inoinfo
#

I have been told that doing fsck while mounted is a very bad thing, but I
did fsck before the
above depicted instantiation of the fsck command and after this and it
always did the same
thing. I have done fsck using the argument /dev/da0s4,
 I have done fsck in single user mode (the 160GB hard boots a character
based shell, but crashes
and reboots during "startx") and always the fsck looks the same.  My
configuration of the 160GB
is a little goofy, in my estimation, just to explain.  I currently have
three hard drives representing
all the times I have installed FreeBSD, two of them are dual booted with MS
Vista, and this latest
one with 160GB has FreeBSD all to itself, but when I was creating it, I
mistook partitions for
slices so I configured 4 partitions, leaving some of the disk unallocated
thinking that would be
good for that 10% utilization thing.  I mount  three partitions on /, /var,
and /usr; respectively
and the last one as swap.  I learned the vi editor in 1985 and tend to
recount the flavor of
unix as "evax" but at this point I wonder if this "evax" concept is
mistaken.  I have done a bunch
of c programming in university courses, but also spent some time doing
molecular biology but
they had me on a SUN SPARCstation I guess.  Didn't mess with that source
code.

Anyway.  Sorry for not being concise. I thought maybe my background might be
useful information.
I was told to do another diagnostic, alleged to pin the disk down as having
no bad sectors:

# dd if=/dev/da0 bs=65536 of=/dev/null
2442045+1 records in
2442045+1 records out
160041885696 bytes transferred in 5718.122211 secs (27988539 bytes/sec)
# echo $?
0
#

I was told that the fact that it returns 0 was good.


I also tried the port called recoverdisk, but that was taking extremely
long.  I accidently disconnected the
USB port

# /usr/src/tools/tools/recoverdisk
zsh: permission denied: /usr/src/tools/tools/recoverdisk
# set -o vi
# ls /usr/src/tools/tools/recoverdisk
Makefilerecoverdisk.1   recoverdisk.c
# cd /usr/src/tools/tools/recoverdisk
# make
Warning: Object directory not changed from original
/usr/src/tools/tools/recoverdisk
cc -O2 -fno-strict-aliasing -pipe  -Wsystem-headers -Werror -Wall
-Wno-format-y2k -W -Wno-unused-parameter -Wstrict-prototypes
-Wmissing-prototypes -Wpointer-arith -Wreturn-type -Wcast-qual
-Wwrite-strings -Wswitch -Wshadow -Wcast-align -Wunused-parameter
-Wchar-subscripts -Winline -Wnested-externs -Wredundant-decls -c
recoverdisk.c
cc -O2 -fno-strict-aliasing -pipe  -Wsystem-headers -Werror -Wall
-Wno-format-y2k -W -Wno-unused-parameter -Wstrict-prototypes
-Wmissing-prototypes -Wpointer-arith -Wreturn-type -Wcast-qual
-Wwrite-strings -Wswitch -Wshadow -Wcast-align -Wunused-parameter
-Wchar-subscripts -Winline -Wnested-externs -Wredundant-decls  -o
recoverdisk recoverdisk.o
gzip -cn recoverdisk.1 > recoverdisk.1.gz
# ls
Makefilerecoverdisk.1   recoverdisk.c
recoverdisk recoverdisk.1.gzrecoverdisk.o
# ./recoverdisk
usage: recoverdisk [-r worklist] [-w worklist] source-drive [destination]
# ./recoverdisk /dev/da0s4
startsize   len state  done remaining%
done
590348288 1048576  134551002112 0 590348288  134551002112
0.0043684

It had run for perhaps half an hour and still was only 0.3% done or so.


finally, the guy downstairs told me to debug the kernel so I found this
page:

http://www.freebsd.org/doc/en/books/developers-handbook/kerneldebug-gdb.html

and after mounting the /usr partition I am here:

-rw-r--r--  1 root  wheel 21360 Jun 22 10:30 yarrow.o
# kgdb /mnt/nexstar/obj/usr/src/sys/KV_KERN/kernel.debug vmcore.12
[GDB will not be able to debug user-mode threads: /usr/lib/libthread_db.so:
Undefined symbol "ps_pglobal_lookup"]
GNU gdb 6.1.1 [FreeBSD]
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warrant

Re: Auto Backup Data and Delete for Account Expired

2008-10-16 Thread Kalpin Erlangga Silaen

Dear Jeremy,

Jeremy Chadwick wrote:

On Thu, Oct 16, 2008 at 03:17:14PM +0700, Kalpin Erlangga Silaen wrote:
  

Dear all,

is there any routines to check if some accounts expire then system would
like to do backup all data to certain directory and then delete the account.

Any help would be appreciate.



You sent this mail to the list yesterday.  We saw it.

  
I am sorry, my email client was error and all sent email still exist in 
outbox. I have fix it. Thank you


Kalpin Erlangga Silaen

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Radius Authentication

2008-10-16 Thread Todor Genov
Hi Matt,


The three important steps here are as follows:

1.) Confirm that authentication against the RADIUS server succeeds using
any command line RADIUS util.

2.) configure /etc/radius.conf as per "man pam_radius" and man "radius.conf"

3.) Add a user on the FreeBSD machine whose name corresponds with the
Windows domain account (if the name contains spaces then refer to the
pre-Windows2000 compatible username in AD). This is mandatory as
pam_radius is only used for authentication. UID, GID, home dir and all
*nix relevant account parameters are still retrieved from the local user
database.

 An alternative to step 3 would be to use the template_user option in
radius.conf, but this means that all your Windows users will appear to
the system with same UID/GID as the template_user.


MattAD wrote:
> I would just like to know if anyone on earth has been able to get the
> pam_radius module working on FreeBSD, using a windows domain username
> through ssh... ??? This has become a mystery to me. My /etc/pam.d/sshd
> config looks like so:  
> 
> #
> # $FreeBSD: src/etc/pam.d/sshd,v 1.16 2007/06/10 18:57:20 yar Exp $
> #
> # PAM configuration for the "sshd" service
> #
> 
> # auth
> authrequiredpam_nologin.so  no_warn
> authsufficient  pam_opie.so no_warn
> no_fake_prompts
> authrequisite   pam_opieaccess.so   no_warn allow_local
> authsufficient  pam_radius.so   no_warn
> try_first_pass
> #auth   sufficient  pam_krb5.so no_warn
> try_first_pass
> #auth   sufficient  pam_ssh.so  no_warn
> try_first_pass
> authsufficient  pam_unix.so no_warn
> try_first_pass
> 
> # account
> account requiredpam_nologin.so
> #accountrequiredpam_krb5.so
> account requiredpam_login_access.so
> account requiredpam_unix.so
> 
> # session
> #sessionoptionalpam_ssh.so
> session requiredpam_permit.so
> 
> # password
> #password   sufficient  pam_krb5.so no_warn
> try_first_pass
> passwordrequiredpam_unix.so no_warn
> try_first_pass
> 
> 
> :confused:

-- 
Regards,

Todor Genov
Systems Operations

Verizon Business South Africa (Pty) Ltd

[EMAIL PROTECTED]
Tel: +27 11 235 6500
Fax: 086 692 0543
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Jeremy Chadwick <[EMAIL PROTECTED]> escribió:


On Thu, Oct 16, 2008 at 05:38:07PM +0100, RW wrote:

On Thu, 16 Oct 2008 08:54:55 -0700 (PDT)
Luke Dean <[EMAIL PROTECTED]> wrote:

>
>
> On Thu, 16 Oct 2008, Matthew Seaman wrote:
>
> > Until the wonderful day that the entire internet abides by these
> > rules[*], use
> > of technologies like SPF and DKIM can discourage but not entirely
> > prevent the spammers from joe-jobbing you.
>
> I just started getting these bouncebacks en masse this week.
> My mail provider publishes SPF records.

SPF increases the probability of spam being rejected at the smtp
level at MX servers, so my expectation would be that it would exacerbate
backscatter not improve it.


Just a side comment for added clarity: this ultimately depends on how
the mail server administrator implemented SPF.  For example, our mail
servers *do not* do SPF lookups at the SMTP level (e.g. in postfix)
because 1) the added complexity is not worth it, and 2) spammers are
now hijacking DNS.

Instead, our servers use SPF in SpamAssassin, subtracting from
the spam probability score if an SPF record is found and matches
appropriately.


That sounds like it is definitely worth trying.

Thanks,

ed


--
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Edwin Groothuis <[EMAIL PROTECTED]> escribió:


In the last hour, I've received over 200 legitimate bounce messages
from email services as a result of someone having used or worse is
using my email address in spam from multiple windows machines and ip
addresses.


When this happens I enable the "move all messages from mailer-daemon
to /dev/null" rules in procmail for a day or two. And curse at the
people who originated the original spam...

Edwin


Edwin,great idea especially the last part.  I have done a good job of  
that today.



ed


--
Edwin Groothuis Website: http://www.mavetju.org/
[EMAIL PROTECTED]   Weblog:  http://www.mavetju.org/weblog/
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: How to get my Dad's Win2k system to access internet through my FreeBSD 6.2 system

2008-10-16 Thread RW
On Thu, 16 Oct 2008 04:43:48 -0700
Jeremy Chadwick <[EMAIL PROTECTED]> wrote:


> What Michael's describing is a feature many DSL modems offer.  There
> is no official term for what it is,

They are commonly referred to as half-bridge modems.

> The reason this feature is HIGHLY desired is because not all PPPoE
> implementations are compatible with an ISPs implementation.  

Even more so if you have PPPoA with no, or poorly-supported, PPPoE.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Printing to a Lanier LD160c does not work

2008-10-16 Thread Warren Block

On Thu, 16 Oct 2008, [EMAIL PROTECTED] wrote:

I am trying to setup a Lanier LD160c (admincolor) that has a network 
interface.  I am new to FreeBSD and tried to follow the handbook.  I 
am able to print to a HP 5SI (corp-admin) with no problems.  There are 
no errors in the lpd-errs and the file is drained from the queue, but 
the printer does not print anything.  And this is a working printer to 
Windows. lpr -P admincolor testfile.txt


printcap:
corp-admin|hp|laserjet|Hewlett Packard LaserJet 5Si:\
   :lp=\
   :sd=/var/spool/output/corp-admin:rm=corp-admin:\
   :lf=/var/log/lpd-errs:\
   :if=/usr/local/libexec/crlfilter:sh:tr=\f:mx#0:

admincolor|hp|laserjet|LANIER LD160c RPCS:\
   :lp=\
   :sd=/var/spool/output/admincolor:rm=admincolor:\
   :lf=/var/log/lpd-errs:


Note here that in the second entry you don't have the :sh: and :mx#0: 
entries.  No :if=: either, but maybe that's because you don't need an 
input filter for this printer.


At first guess, this printer may be touchy about the print queue name. 
That's the :rp=: parameter, which is not here at all.  There are a 
couple of KB entries on the Lanier site that say to use "lp".


printcap entries are easier to read if you put one option per line:

admincolor:\
:lp=:\
:sh:\
:mx#0:\
:rm=admincolor:\
:rp=lp:\
:sd=/var/spool/output/admincolor:\
:lf=/var/log/lpd-errs:

-Warren Block * Rapid City, South Dakota USA
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: [SOLVED] Xircom 10/100 cardbus w/ 7-RELEASE

2008-10-16 Thread Steven Susbauer

Steven Susbauer wrote:

I have read a few places of people having issues with the Xircom cardbus
networking adapter with -CURRENT and, I guess, with release 7. My card
is an IBM EtherFast 10/100.

This card works fine in 6.3. In 7 I get "dc0: No station address in
CIS!" - same driver

This problem appears to be mentioned in
http://unix.derkeiler.com/Mailing-Lists/FreeBSD/current/2006-10/msg00226.html


Any ideas on how to fix this issue? I do not have networking on the
release cds nor through freebsd-upgrade with the 7-GENERIC kernel. I
have to roll back the upgrade to get back online.

Thanks




I've since solved this problem with some help, but I'm hoping this will
get up on Google if someone finds my original message.

The fix is in a kernel patch at
http://lists.freebsd.org/pipermail/freebsd-bugs/2007-December/027280.html
- The problem has not been fixed in the -STABLE/-CURRENT sources as of
today. Since the misbehaving file has not been changed in any of them
the patch still works.


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Lost the "require" meny alternative with Gimp upgrade

2008-10-16 Thread Warren Block

On Thu, 16 Oct 2008, Leslie Jensen wrote:

I upgraded Gimp to version 2.6.1 and now I do not have the require (for 
scanning) meny choice anymore.


"Acquire", maybe?


Any ideas on how to get the function back.

I can scan using xscanimage but it takes more steps to get the scanned image 
into Gimp.


In gimp 2.6.1, the SANE scanner plugin is on the File/Create menu.

-Warren Block * Rapid City, South Dakota USA
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Edwin Groothuis
> In the last hour, I've received over 200 legitimate bounce messages
> from email services as a result of someone having used or worse is
> using my email address in spam from multiple windows machines and ip
> addresses.

When this happens I enable the "move all messages from mailer-daemon
to /dev/null" rules in procmail for a day or two. And curse at the
people who originated the original spam...

Edwin

-- 
Edwin Groothuis Website: http://www.mavetju.org/
[EMAIL PROTECTED]   Weblog:  http://www.mavetju.org/weblog/
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Per olof Ljungmark

Jeremy Chadwick wrote:

On Thu, Oct 16, 2008 at 11:36:51PM +0200, Per olof Ljungmark wrote:

Mel wrote:

On Thursday 16 October 2008 22:07:43 Per olof Ljungmark wrote:

Per olof Ljungmark wrote:

Daniel Bye wrote:

On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:

It is possible to configure sudo to run only exactly the required
command
(including arguments) precisely to guard against this type of abuse -
I use it extensively in my own nagios setup.

This Cmnd_Alias in sudoers will do the trick:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0

man sudoers for more information about what you can do with sudo.

I just realised this example is woefully incomplete - apologies for
that.

There are a few ways you can set up /usr/local/etc/sudoers (make sure
you use visudo to edit it, as it will catch any syntax errors for you,
thus helping somewhat to prevent breaking your setup).

The simplest case will just be to allow nagios to run the command, as
root,
without a password:

nagios ALL=(root) NOPASSWD: /sbin/camcontrol inquiry da0

If, as is quite possible, nagios should be able to run more than just
that one command, you can define a Cmnd_Alias, as above. To include more
than one command in the alias, simply separate them with a comma. You
can use `\' to escape newlines and make your file a little easier to
read:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0 \
  /sbin/camcontrol inquiry da1

and so on. Now, to use that alias, set the user's permissions to

nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS

 


For the records, even this won't work because nagois needs access to
/dev/xpt0 as well and once there sudo can't help.

sudo -u nagios /sbin/camcontrol inquiry da0
camcontrol: cam_lookup_pass: couldn't open /dev/xpt0
cam_lookup_pass: Permission denied
The idea is to let this be run as root, tho personally, I'd put nagios 
in a group that can rw /dev/xpt0, /dev/pass0 and /dev/da0, setup 
devfs.rules properly and the let it execute a script that does the 
inquiry and the inquiry only.


On a related note, it would be a 'nice to have', if the more dangerous  
commands of camcontrol had a sysctl knob that only allows them to be 
executed only as root.
But... the command "/sbin/camcontrol inquiry da0" IS run as root through  
the setup in sudoers above, but it is not enough or I'm overseeing  
something. Anyway, I've already decided to scrap the sudo idea, too  
kludgy for me.


Scrapping it is fine, but you still aren't understanding how to use
sudo.

The -u flag tells sudo what UID to switch to.  Meaning, your above
command (sudo -u nagios /sbin/camcontrol...) tells the system "run
/sbin/camcontrol as user nagios".  This **does not** tell the system
to run /sbin/camcontrol as user root.

For example, let's say you're logged in as user nagios (or running
commands as user nagios):

[EMAIL PROTECTED] sudo -u nagios whoami
nagios
[EMAIL PROTECTED]

This obviously isn't what you want -- this tells sudo to switch to
UID nagios (you already ARE this user!) and run the "whoami" command.

But this IS what you want:

[EMAIL PROTECTED] sudo whoami
root
[EMAIL PROTECTED]

You'll need to use visudo(8) to configure sudo to 1) permit user
"nagios" to use sudo (and switch to UID root), and 2) to ONLY RUN
/sbin/camcontrol when sudo is run, otherwise someone could do:

[EMAIL PROTECTED] sudo rm -fr /

You get the point now, I'm sure.


Yep, promise :-)

I'm off to bed but will try to work out the sudo magic tomorrow although 
I'm still incloned to an alternative solution.

--
per
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Per olof Ljungmark

Mel wrote:

On Thursday 16 October 2008 23:36:51 Per olof Ljungmark wrote:

Mel wrote:

On Thursday 16 October 2008 22:07:43 Per olof Ljungmark wrote:

Per olof Ljungmark wrote:

Daniel Bye wrote:

On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:





nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS

 

This means:
ALLOW nagios user from anywhere to run commands NAGIOS_CMNDS as user root 
without a password.



For the records, even this won't work because nagois needs access to
/dev/xpt0 as well and once there sudo can't help.

sudo -u nagios /sbin/camcontrol inquiry da0
camcontrol: cam_lookup_pass: couldn't open /dev/xpt0
cam_lookup_pass: Permission denied


The above sudo command, runs as nagios user, not as root.


But... the command "/sbin/camcontrol inquiry da0" IS run as root through
the setup in sudoers above,


See above. To test if it would work, you'd have to login as nagios then run 
sudo /sbin/camcontrol inquiry da0.


OK, I'm sure you're right, this was my first encounter with sudo. But, 
nagios, running in parallel, reported identical results as the ones I 
got from the command line. That is why I draw the conclusion that giving 
nagios root access to NAGIOS_CMNDS was not enough and the reported error 
(access to /dev/xpt0) was not part of any direct command.


Maybe this is wrong and I made a mistake but because this is *nix I'm 
confident there are other less kludgy solutions to the problem.

--
per
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 11:36:51PM +0200, Per olof Ljungmark wrote:
> Mel wrote:
>> On Thursday 16 October 2008 22:07:43 Per olof Ljungmark wrote:
>>> Per olof Ljungmark wrote:
 Daniel Bye wrote:
> On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:
>> It is possible to configure sudo to run only exactly the required
>> command
>> (including arguments) precisely to guard against this type of abuse -
>> I use it extensively in my own nagios setup.
>>
>> This Cmnd_Alias in sudoers will do the trick:
>>
>> Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0
>>
>> man sudoers for more information about what you can do with sudo.
> I just realised this example is woefully incomplete - apologies for
> that.
>
> There are a few ways you can set up /usr/local/etc/sudoers (make sure
> you use visudo to edit it, as it will catch any syntax errors for you,
> thus helping somewhat to prevent breaking your setup).
>
> The simplest case will just be to allow nagios to run the command, as
> root,
> without a password:
>
> nagios ALL=(root) NOPASSWD: /sbin/camcontrol inquiry da0
>
> If, as is quite possible, nagios should be able to run more than just
> that one command, you can define a Cmnd_Alias, as above. To include more
> than one command in the alias, simply separate them with a comma. You
> can use `\' to escape newlines and make your file a little easier to
> read:
>
> Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0 \
>   /sbin/camcontrol inquiry da1
>
> and so on. Now, to use that alias, set the user's permissions to
>
> nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS
>>  
>>
>>> For the records, even this won't work because nagois needs access to
>>> /dev/xpt0 as well and once there sudo can't help.
>>>
>>> sudo -u nagios /sbin/camcontrol inquiry da0
>>> camcontrol: cam_lookup_pass: couldn't open /dev/xpt0
>>> cam_lookup_pass: Permission denied
>>
>> The idea is to let this be run as root, tho personally, I'd put nagios 
>> in a group that can rw /dev/xpt0, /dev/pass0 and /dev/da0, setup 
>> devfs.rules properly and the let it execute a script that does the 
>> inquiry and the inquiry only.
>>
>> On a related note, it would be a 'nice to have', if the more dangerous  
>> commands of camcontrol had a sysctl knob that only allows them to be 
>> executed only as root.
>
> But... the command "/sbin/camcontrol inquiry da0" IS run as root through  
> the setup in sudoers above, but it is not enough or I'm overseeing  
> something. Anyway, I've already decided to scrap the sudo idea, too  
> kludgy for me.

Scrapping it is fine, but you still aren't understanding how to use
sudo.

The -u flag tells sudo what UID to switch to.  Meaning, your above
command (sudo -u nagios /sbin/camcontrol...) tells the system "run
/sbin/camcontrol as user nagios".  This **does not** tell the system
to run /sbin/camcontrol as user root.

For example, let's say you're logged in as user nagios (or running
commands as user nagios):

[EMAIL PROTECTED] sudo -u nagios whoami
nagios
[EMAIL PROTECTED]

This obviously isn't what you want -- this tells sudo to switch to
UID nagios (you already ARE this user!) and run the "whoami" command.

But this IS what you want:

[EMAIL PROTECTED] sudo whoami
root
[EMAIL PROTECTED]

You'll need to use visudo(8) to configure sudo to 1) permit user
"nagios" to use sudo (and switch to UID root), and 2) to ONLY RUN
/sbin/camcontrol when sudo is run, otherwise someone could do:

[EMAIL PROTECTED] sudo rm -fr /

You get the point now, I'm sure.

> The idea of running nagios with rw access to the devices is not very  
> appealing either as Jeremy pointed out.
>
> I will start from square one with a different approach that I need to  
> dream up tomorrow.

I must again point out that using a C-based wrapper is a much
better idea, especially if this is the only command you need to
run as root.

The wrapper is a 15-20 line C program, if that, and will only run
one command: /sbin/camcontrol inquiry da0.  It can't be used to do
anything else.

If you really want someone to write this for you, I will do it.

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Mel
On Thursday 16 October 2008 23:36:51 Per olof Ljungmark wrote:
> Mel wrote:
> > On Thursday 16 October 2008 22:07:43 Per olof Ljungmark wrote:
> >> Per olof Ljungmark wrote:
> >>> Daniel Bye wrote:
>  On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:



>  nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS
> >
> >  
This means:
ALLOW nagios user from anywhere to run commands NAGIOS_CMNDS as user root 
without a password.

> >> For the records, even this won't work because nagois needs access to
> >> /dev/xpt0 as well and once there sudo can't help.
> >>
> >> sudo -u nagios /sbin/camcontrol inquiry da0
> >> camcontrol: cam_lookup_pass: couldn't open /dev/xpt0
> >> cam_lookup_pass: Permission denied

The above sudo command, runs as nagios user, not as root.

> But... the command "/sbin/camcontrol inquiry da0" IS run as root through
> the setup in sudoers above,

See above. To test if it would work, you'd have to login as nagios then run 
sudo /sbin/camcontrol inquiry da0.
-- 
Mel

Problem with today's modular software: they start with the modules
and never get to the software part.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Per olof Ljungmark

Mel wrote:

On Thursday 16 October 2008 22:07:43 Per olof Ljungmark wrote:

Per olof Ljungmark wrote:

Daniel Bye wrote:

On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:

It is possible to configure sudo to run only exactly the required
command
(including arguments) precisely to guard against this type of abuse -
I use it extensively in my own nagios setup.

This Cmnd_Alias in sudoers will do the trick:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0

man sudoers for more information about what you can do with sudo.

I just realised this example is woefully incomplete - apologies for
that.

There are a few ways you can set up /usr/local/etc/sudoers (make sure
you use visudo to edit it, as it will catch any syntax errors for you,
thus helping somewhat to prevent breaking your setup).

The simplest case will just be to allow nagios to run the command, as
root,
without a password:

nagios ALL=(root) NOPASSWD: /sbin/camcontrol inquiry da0

If, as is quite possible, nagios should be able to run more than just
that one command, you can define a Cmnd_Alias, as above. To include more
than one command in the alias, simply separate them with a comma. You
can use `\' to escape newlines and make your file a little easier to
read:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0 \
  /sbin/camcontrol inquiry da1

and so on. Now, to use that alias, set the user's permissions to

nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS

 


For the records, even this won't work because nagois needs access to
/dev/xpt0 as well and once there sudo can't help.

sudo -u nagios /sbin/camcontrol inquiry da0
camcontrol: cam_lookup_pass: couldn't open /dev/xpt0
cam_lookup_pass: Permission denied


The idea is to let this be run as root, tho personally, I'd put nagios in a 
group that can rw /dev/xpt0, /dev/pass0 and /dev/da0, setup devfs.rules 
properly and the let it execute a script that does the inquiry and the 
inquiry only.


On a related note, it would be a 'nice to have', if the more dangerous 
commands of camcontrol had a sysctl knob that only allows them to be executed 
only as root.


But... the command "/sbin/camcontrol inquiry da0" IS run as root through 
the setup in sudoers above, but it is not enough or I'm overseeing 
something. Anyway, I've already decided to scrap the sudo idea, too 
kludgy for me.


The idea of running nagios with rw access to the devices is not very 
appealing either as Jeremy pointed out.


I will start from square one with a different approach that I need to 
dream up tomorrow.

Thanks,
--
per
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Printing to a Lanier LD160c does not work

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 08:36:42PM +, [EMAIL PROTECTED] wrote:
> I am trying to setup a Lanier LD160c (admincolor) that has a network 
> interface.  I am new to FreeBSD and tried to follow the handbook.  I am able 
> to print to a HP 5SI (corp-admin) with no problems.  There are no errors in 
> the lpd-errs and the file is drained from the queue, but the printer does not 
> print anything.  And this is a working printer to Windows. 
> lpr -P admincolor testfile.txt 
> 
> printcap: 
> corp-admin|hp|laserjet|Hewlett Packard LaserJet 5Si:\ 
> :lp=\ 
> :sd=/var/spool/output/corp-admin:rm=corp-admin:\ 
> :lf=/var/log/lpd-errs:\ 
> :if=/usr/local/libexec/crlfilter:sh:tr=\f:mx#0: 
> 
> admincolor|hp|laserjet|LANIER LD160c RPCS:\ 
> :lp=\ 
> :sd=/var/spool/output/admincolor:rm=admincolor:\ 
> :lf=/var/log/lpd-errs: 

If this printer is hooked up on the network (e.g. via Ethernet), I
believe you need to set the lp variable to the hostname or IP address of
the printer, e.g.:

admincolor|hp|laserjet|LANIER LD160c RPCS:\ 
:lp=192.168.1.100\
:sd=/var/spool/output/admincolor:rm=admincolor:\
:lf=/var/log/lpd-errs:

I think this also makes the assumption that the printer knows how to
speak the LPR protocol.  If it listens on a custom port, you can use
[EMAIL PROTECTED] instead.  See the printcap(5) man page, I guess.

P.S. -- I've never done this, it's just something I remember from
old days.  :-)

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


g4u and ftp

2008-10-16 Thread Jean-Paul Natola
Hi all,

I'm having an issue trying to write to my ftp server from linux-

I just setup the ftp server with read and write access anonymous login

>From windows explorer no-problem from the mac's no problem- but when I try to
upload an image using  g4u  (http://www.feyrer.de/g4u/) I get rejected by the
MS ftp server 


Im not sure why it doesn't let me any thoughts?

tia



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Printing to a Lanier LD160c does not work

2008-10-16 Thread ajphanks
I am trying to setup a Lanier LD160c (admincolor) that has a network interface. 
 I am new to FreeBSD and tried to follow the handbook.  I am able to print to a 
HP 5SI (corp-admin) with no problems.  There are no errors in the lpd-errs and 
the file is drained from the queue, but the printer does not print anything.  
And this is a working printer to Windows. 
lpr -P admincolor testfile.txt 

printcap: 
corp-admin|hp|laserjet|Hewlett Packard LaserJet 5Si:\ 
:lp=\ 
:sd=/var/spool/output/corp-admin:rm=corp-admin:\ 
:lf=/var/log/lpd-errs:\ 
:if=/usr/local/libexec/crlfilter:sh:tr=\f:mx#0: 

admincolor|hp|laserjet|LANIER LD160c RPCS:\ 
:lp=\ 
:sd=/var/spool/output/admincolor:rm=admincolor:\ 
:lf=/var/log/lpd-errs: 

I have tried to edit the printcap file and change the 1st line to see if it has 
any difference, restarted the lpd.  chkprintcap does not generate any messages. 
 Any clues where I can start troubleshooting? 

/var/spool/output 
drwxrwx---  2 daemon  daemon  512 Oct 10 14:46 admincolor 
drwxrwx---  2 daemon  daemon  512 Oct 10 14:05 corp-admin 
drwxr-xr-x  2 rootdaemon  512 Oct 10 13:37 lpd 
-rw-rw-r--  1 rootdaemon5 Oct 10 14:28 lpd.lock 

I would appreciate any help on this.

Pat Hanks
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Mel
On Thursday 16 October 2008 22:07:43 Per olof Ljungmark wrote:
> Per olof Ljungmark wrote:
> > Daniel Bye wrote:
> >> On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:
> >>> It is possible to configure sudo to run only exactly the required
> >>> command
> >>> (including arguments) precisely to guard against this type of abuse -
> >>> I use it extensively in my own nagios setup.
> >>>
> >>> This Cmnd_Alias in sudoers will do the trick:
> >>>
> >>> Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0
> >>>
> >>> man sudoers for more information about what you can do with sudo.
> >>
> >> I just realised this example is woefully incomplete - apologies for
> >> that.
> >>
> >> There are a few ways you can set up /usr/local/etc/sudoers (make sure
> >> you use visudo to edit it, as it will catch any syntax errors for you,
> >> thus helping somewhat to prevent breaking your setup).
> >>
> >> The simplest case will just be to allow nagios to run the command, as
> >> root,
> >> without a password:
> >>
> >> nagios ALL=(root) NOPASSWD: /sbin/camcontrol inquiry da0
> >>
> >> If, as is quite possible, nagios should be able to run more than just
> >> that one command, you can define a Cmnd_Alias, as above. To include more
> >> than one command in the alias, simply separate them with a comma. You
> >> can use `\' to escape newlines and make your file a little easier to
> >> read:
> >>
> >> Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0 \
> >>   /sbin/camcontrol inquiry da1
> >>
> >> and so on. Now, to use that alias, set the user's permissions to
> >>
> >> nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS
 

> For the records, even this won't work because nagois needs access to
> /dev/xpt0 as well and once there sudo can't help.
>
> sudo -u nagios /sbin/camcontrol inquiry da0
> camcontrol: cam_lookup_pass: couldn't open /dev/xpt0
> cam_lookup_pass: Permission denied

The idea is to let this be run as root, tho personally, I'd put nagios in a 
group that can rw /dev/xpt0, /dev/pass0 and /dev/da0, setup devfs.rules 
properly and the let it execute a script that does the inquiry and the 
inquiry only.

On a related note, it would be a 'nice to have', if the more dangerous 
commands of camcontrol had a sysctl knob that only allows them to be executed 
only as root.
-- 
Mel

Problem with today's modular software: they start with the modules
and never get to the software part.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Per olof Ljungmark

Per olof Ljungmark wrote:

Daniel Bye wrote:

On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:
It is possible to configure sudo to run only exactly the required 
command

(including arguments) precisely to guard against this type of abuse -
I use it extensively in my own nagios setup.

This Cmnd_Alias in sudoers will do the trick:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0

man sudoers for more information about what you can do with sudo.


I just realised this example is woefully incomplete - apologies for that.

There are a few ways you can set up /usr/local/etc/sudoers (make sure
you use visudo to edit it, as it will catch any syntax errors for you,
thus helping somewhat to prevent breaking your setup).

The simplest case will just be to allow nagios to run the command, as 
root,

without a password:

nagios ALL=(root) NOPASSWD: /sbin/camcontrol inquiry da0

If, as is quite possible, nagios should be able to run more than just
that one command, you can define a Cmnd_Alias, as above. To include more
than one command in the alias, simply separate them with a comma. You
can use `\' to escape newlines and make your file a little easier to 
read:


Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0 \
  /sbin/camcontrol inquiry da1

and so on. Now, to use that alias, set the user's permissions to

nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS


For the records, even this won't work because nagois needs access to 
/dev/xpt0 as well and once there sudo can't help.


sudo -u nagios /sbin/camcontrol inquiry da0
camcontrol: cam_lookup_pass: couldn't open /dev/xpt0
cam_lookup_pass: Permission denied

--per
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Lost the "require" meny alternative with Gimp upgrade

2008-10-16 Thread Leslie Jensen


Hello

I upgraded Gimp to version 2.6.1 and now I do not have the require (for 
scanning) meny choice anymore.


Any ideas on how to get the function back.

I can scan using xscanimage but it takes more steps to get the scanned 
image into Gimp.


/Leslie
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD RELENG_7 scsi and usb, usb disks take precedence

2008-10-16 Thread Svein Skogen (List Mail Account)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Dan Nelson wrote:
> In the last episode (Oct 16), Eric Masson said:
>> "Svein Skogen (List Mail Account)" <[EMAIL PROTECTED]> writes:
>>> With all due respect, if sysinstall isn't able to write those labels,
>>> this is hardly the solution to the problem...  ;)
>> Sysinstall, even if it has proven to be useful, is outdated in many
>> respects, it doesn't cope really well with GEOM or ZFS for example.
>>
>> Using GEOM labels ensure that fstab will always be consistent, so
>> *this is* a solution.
>>
>> Now, you can try to patch the kernel to make it probe devices in a
>> predefined & sorted order, but I guess it will be much more difficult
>> ;)
> 
> No patching needed.  You can wire down the unit number of your scsi bus
> and drive with boot hints as described in the scsi(4) manpage.  Wire
> the adaptec card down as scbus0, and wire the device at scbus0.0 down
> as da0.

Thank you. :)

//Svein

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkj3hWsACgkQtVbTV+BEzaOsfgCfWYOjk23XVQhESghcBb6IGuNH
xkIAnRSpdXWZ9yLxQMiFlV++8cAsmTgT
=Qkdr
-END PGP SIGNATURE-
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 05:38:07PM +0100, RW wrote:
> On Thu, 16 Oct 2008 08:54:55 -0700 (PDT)
> Luke Dean <[EMAIL PROTECTED]> wrote:
> 
> > 
> > 
> > On Thu, 16 Oct 2008, Matthew Seaman wrote:
> > 
> > > Until the wonderful day that the entire internet abides by these
> > > rules[*], use
> > > of technologies like SPF and DKIM can discourage but not entirely
> > > prevent the spammers from joe-jobbing you.
> > 
> > I just started getting these bouncebacks en masse this week.
> > My mail provider publishes SPF records.
> 
> SPF increases the probability of spam being rejected at the smtp
> level at MX servers, so my expectation would be that it would exacerbate
> backscatter not improve it. 

Just a side comment for added clarity: this ultimately depends on how
the mail server administrator implemented SPF.  For example, our mail
servers *do not* do SPF lookups at the SMTP level (e.g. in postfix)
because 1) the added complexity is not worth it, and 2) spammers are
now hijacking DNS.

Instead, our servers use SPF in SpamAssassin, subtracting from
the spam probability score if an SPF record is found and matches
appropriately.

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Matthew Seaman <[EMAIL PROTECTED]> escribió:


[EMAIL PROTECTED] wrote:

RW <[EMAIL PROTECTED]> escribió:


On Thu, 16 Oct 2008 08:54:55 -0700 (PDT)
Luke Dean <[EMAIL PROTECTED]> wrote:




On Thu, 16 Oct 2008, Matthew Seaman wrote:


Until the wonderful day that the entire internet abides by these
rules[*], use
of technologies like SPF and DKIM can discourage but not entirely
prevent the spammers from joe-jobbing you.


I just started getting these bouncebacks en masse this week.
My mail provider publishes SPF records.


SPF increases the probability of spam being rejected at the smtp
level at MX servers, so my expectation would be that it would exacerbate
backscatter not improve it.

Many people recommend SPF for backscatter, but I've yet to hear a cogent
argument for why it helps beyond the very optimistic hope that spammers
will check that their spam is spf compliant.


I feel the same way and thanks for adding some humor to the situation.


Most spammers aren't aiming to generate back-scatter as their primary
means of disseminating their spam, so they'll do what they can to get
the best chance of a successful delivery.  That means sending SPF  
compliant e-mails where possible.  It's actually quite simple for  
them to filter out SPF protected addresses from their target lists,  
so they do tend to do that, and it's typically the same list of  
target addresses they use for forged senders too.  It's telling that  
both having a correct SPF record  and having no SPF record at all  
have a zero score in SpamAssassin (ie. neutral) whereas  
non-compliance scores lots of spam points.


Also see my point earlier about rejecting messages during the SMTP  
dialogue.  SPF is easy to check early and lets you reject messages
before acknowledging receiving them, which means a lot fewer bounce  
messages to (probably forged) sender addresses.

Thanks, Matthew.

That I've not done due to the possibility of rejecting legit email.   
I'm going to revisit that decision.


ed



Cheers,

Matthew

--
Dr Matthew J Seaman MA, D.Phil.   7 Priory Courtyard
 Flat 3
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
 Kent, CT11 9PW




___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Paul Schmehl <[EMAIL PROTECTED]> escribió:


--On Thursday, October 16, 2008 09:01:02 -0500 [EMAIL PROTECTED] wrote:



In the last hour, I've received over 200 legitimate bounce messages
from email services as a result of someone having used or worse is
using my email address in spam from multiple windows machines and ip
addresses.  The end result is that I am getting the bounce messages.
I'm sure that others on this list have experienced the problem and
maybe have a solution that I don't have.

The messages are allowed through my obspamd/pf and pf smtp bruteforce
blocking rules because they are completely legit.

I guess the work around is to filter them on incoming together with
our local bounce messaages util the spammers get tired of my address.



We call those "bounceback spam".  The only solution that I know of  
is to tag all outgoing messages with a special header and then check  
for that header on all returns and reject those that don't contain  
the header.  All legitimate bounces would contain the header because  
they originated with your MTA.


E.g. X-Bounceback-Check: 0987923874


I have added headers for years but unfortunately these didn't  
originate on my servers.  My email address was used as the return  
address for spam sent from multiple windows machines to .ru addresses.


Thanks for the suggestion, Paul.

ed



The value of the header can be anything you want it to be, and you  
can change it periodically if you want to keep statistical data.


--
Paul Schmehl ([EMAIL PROTECTED])
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

RW <[EMAIL PROTECTED]> escribió:


On Thu, 16 Oct 2008 11:58:44 -0500
[EMAIL PROTECTED] wrote:


RW <[EMAIL PROTECTED]> escribi__:

> Many people recommend SPF for backscatter, but I've yet to hear a
> cogent argument for why it helps beyond the very optimistic hope
> that spammers will check that their spam is spf compliant.

I feel the same way and thanks for adding some humor to the situation.


Actually that wasn't a joke, some people do cite that as the reason
why SPF helps with backscatter, that spammers will leave your domain
out of the "mail from" line if you publish SPF records for it.


I see that but it still touched my funny bone but the problem is how  
many mail servers and admins completely ignore SPF and what happens to  
those who do try to comply?  I'm sure that the hundreds of bounces  
that I have received are minimal in comparison to the delivered email.  
 In fact many are reporting that a user is "over quota"


Thanks,

ed
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Chuck Swiger <[EMAIL PROTECTED]> escribió:


On Oct 16, 2008, at 9:38 AM, RW wrote:

SPF increases the probability of spam being rejected at the smtp
level at MX servers, so my expectation would be that it would exacerbate
backscatter not improve it.


The main problem resulting in backscatter happens when forged spam  
from yourdomain.com get gets sent to a legit MX server which accepts  
the mail initially, and then generates a bounce due to later spam  
checking or failed delivery to an invalid user.  The bounces which  
then get generated by the legit MX are likely to pass spam checking  
at yourdomain.com.


Exactly what seems to be happening.


Many people recommend SPF for backscatter, but I've yet to hear a cogent
argument for why it helps beyond the very optimistic hope that spammers
will check that their spam is spf compliant.



SPF doesn't provide a magic solution to backscatter, but it helps  
simplify the problem.


It should.

If spam can be rejected during the SMTP phase rather than accepted,  
then most spam-spewing malware simply drops the attempted message  
rather than actually send a bounce to yourdomain.com.  After all,  
the spammer is looking to deliver spam to lots of different  
mailboxes, not deliver tons of DSNs to a single mailbox or domain.   
Failing that, however, any bounces which are being generated are  
coming from or at least closer to the source of the spam, rather  
than coming from gmail, hotmail, etc.  And if the spamming machine  
is forging your domain, then yourdomain.com MX boxes have a decent  
shot of rejecting the forgeries via hello_checks, RBLs, or other  
methods.


Thanks Chuck,

ed

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Chuck Swiger

On Oct 16, 2008, at 9:38 AM, RW wrote:

SPF increases the probability of spam being rejected at the smtp
level at MX servers, so my expectation would be that it would  
exacerbate

backscatter not improve it.


The main problem resulting in backscatter happens when forged spam  
from yourdomain.com get gets sent to a legit MX server which accepts  
the mail initially, and then generates a bounce due to later spam  
checking or failed delivery to an invalid user.  The bounces which  
then get generated by the legit MX are likely to pass spam checking at  
yourdomain.com.


Many people recommend SPF for backscatter, but I've yet to hear a  
cogent
argument for why it helps beyond the very optimistic hope that  
spammers

will check that their spam is spf compliant.



SPF doesn't provide a magic solution to backscatter, but it helps  
simplify the problem.


If spam can be rejected during the SMTP phase rather than accepted,  
then most spam-spewing malware simply drops the attempted message  
rather than actually send a bounce to yourdomain.com.  After all, the  
spammer is looking to deliver spam to lots of different mailboxes, not  
deliver tons of DSNs to a single mailbox or domain.  Failing that,  
however, any bounces which are being generated are coming from or at  
least closer to the source of the spam, rather than coming from gmail,  
hotmail, etc.  And if the spamming machine is forging your domain,  
then yourdomain.com MX boxes have a decent shot of rejecting the  
forgeries via hello_checks, RBLs, or other methods.


Regards,
--
-Chuck

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread RW
On Thu, 16 Oct 2008 11:58:44 -0500
[EMAIL PROTECTED] wrote:

> RW <[EMAIL PROTECTED]> escribi__:
>
> > Many people recommend SPF for backscatter, but I've yet to hear a
> > cogent argument for why it helps beyond the very optimistic hope
> > that spammers will check that their spam is spf compliant.
> 
> I feel the same way and thanks for adding some humor to the situation.

Actually that wasn't a joke, some people do cite that as the reason
why SPF helps with backscatter, that spammers will leave your domain
out of the "mail from" line if you publish SPF records for it.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Jeremy Chadwick <[EMAIL PROTECTED]> escribió:


On Thu, Oct 16, 2008 at 09:01:02AM -0500, [EMAIL PROTECTED] wrote:

In the last hour, I've received over 200 legitimate bounce messages from
email services as a result of someone having used or worse is using my
email address in spam from multiple windows machines and ip addresses.
The end result is that I am getting the bounce messages.  I'm sure that
others on this list have experienced the problem and maybe have a
solution that I don't have.

The messages are allowed through my obspamd/pf and pf smtp bruteforce
blocking rules because they are completely legit.

I guess the work around is to filter them on incoming together with our
local bounce messaages util the spammers get tired of my address.


The term coined for this type of mail is "backscatter".

There is no easy solution for this.  The backscatter article on
postfix.org, for example, caused our mail servers to start rejecting
mail that was generated from PHP scripts and CGIs on our own systems,
which makes no sense.  The article:

http://www.postfix.org/BACKSCATTER_README.html


Thanks for the article, Jeremy.  I hadn't seen it.


If the backscatter is all directed to a single Email address (rather
than a series of addresses, e.g. [EMAIL PROTECTED], and
you have [EMAIL PROTECTED] accepted), then a solution is to reject
mail with an RCPT TO of an account or virtual address that does not
exist on your machine.

This, of course, has a wonderful side effect: spammers now have a way to
detect what Email addresses on your box legitimately accept mail, thus
once they find one which never gets a bounceback, will start pounding
that address to kingdom come.

Let me know if you do find a reliable, decent solution that does not
involve SPF or postfix header_checks or body_checks.


I wish ;)

Thanks again,

ed



--
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Matthew Seaman

[EMAIL PROTECTED] wrote:

RW <[EMAIL PROTECTED]> escribió:


On Thu, 16 Oct 2008 08:54:55 -0700 (PDT)
Luke Dean <[EMAIL PROTECTED]> wrote:




On Thu, 16 Oct 2008, Matthew Seaman wrote:

> Until the wonderful day that the entire internet abides by these
> rules[*], use
> of technologies like SPF and DKIM can discourage but not entirely
> prevent the spammers from joe-jobbing you.

I just started getting these bouncebacks en masse this week.
My mail provider publishes SPF records.


SPF increases the probability of spam being rejected at the smtp
level at MX servers, so my expectation would be that it would exacerbate
backscatter not improve it.

Many people recommend SPF for backscatter, but I've yet to hear a cogent
argument for why it helps beyond the very optimistic hope that spammers
will check that their spam is spf compliant.


I feel the same way and thanks for adding some humor to the situation.


Most spammers aren't aiming to generate back-scatter as their primary
means of disseminating their spam, so they'll do what they can to get
the best chance of a successful delivery.  That means sending SPF 
compliant e-mails where possible.  It's actually quite simple for them 
to filter out SPF protected addresses from their target lists, so they 
do tend to do that, and it's typically the same list of target addresses they use for forged senders too.  It's telling that both having a correct SPF record  and having no SPF record at all have a zero score in SpamAssassin (ie. neutral) whereas non-compliance scores 
lots of spam points.


Also see my point earlier about rejecting messages during the SMTP 
dialogue.  SPF is easy to check early and lets you reject messages
before acknowledging receiving them, which means a lot fewer bounce 
messages to (probably forged) sender addresses.


Cheers,

Matthew

--
Dr Matthew J Seaman MA, D.Phil.   7 Priory Courtyard
 Flat 3
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
 Kent, CT11 9PW



signature.asc
Description: OpenPGP digital signature


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Luke Dean <[EMAIL PROTECTED]> escribió:




On Thu, 16 Oct 2008, Matthew Seaman wrote:

Until the wonderful day that the entire internet abides by these  
rules[*], use
of technologies like SPF and DKIM can discourage but not entirely  
prevent the

spammers from joe-jobbing you.


I just started getting these bouncebacks en masse this week.
My mail provider publishes SPF records.
If the names and numbers in the bouceback messages are to be  
believed, however, the spammers have defeated SPF by hijacking DNS.   
The poor recipients never see my SPF records because they're looking  
at the wrong IP address.


Thanks, Matthew.  I guess that is the root problem of spf, the  
spammers, that it is supposed to stop.  It looks a bit like our  
economy, a loosing battle.


It really make me feel impotent this morning.

Have a great day,

ed

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Bill Campbell <[EMAIL PROTECTED]> escribió:


On Thu, Oct 16, 2008, [EMAIL PROTECTED] wrote:

In the last hour, I've received over 200 legitimate bounce messages from
email services as a result of someone having used or worse is using my
email address in spam from multiple windows machines and ip addresses.
The end result is that I am getting the bounce messages.  I'm sure that
others on this list have experienced the problem and maybe have a
solution that I don't have.


Did these come from Barracuda boxes?

Blowback like this is hardly new or legitimate as the From and Sender
header addresses are often (usually) forged in spam, and it does not do
anything useful to reply to them.  The forged addresses may just be
something scraped from the address book of a machine running the Microsoft
virus, Windows, or a deliberate ``Joe Job'' where a spammer is targeting
somebody who may have caused them problems.


It had just got up this morning and found my mailbox full of these and  
lost my cool.  I probably sent the email too quickly.  Thanks for  
helping me get it together.


ed


Bill
--
INTERNET:   [EMAIL PROTECTED]  Bill Campbell; Celestial Software LLC
URL: http://www.celestial.com/  PO Box 820; 6641 E. Mercer Way
Voice:  (206) 236-1676  Mercer Island, WA 98040-0820
Fax:(206) 232-9186

Common sense is genius dressed in its working clothes.
  -- Ralph Waldo Emerson
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

RW <[EMAIL PROTECTED]> escribió:


On Thu, 16 Oct 2008 08:54:55 -0700 (PDT)
Luke Dean <[EMAIL PROTECTED]> wrote:




On Thu, 16 Oct 2008, Matthew Seaman wrote:

> Until the wonderful day that the entire internet abides by these
> rules[*], use
> of technologies like SPF and DKIM can discourage but not entirely
> prevent the spammers from joe-jobbing you.

I just started getting these bouncebacks en masse this week.
My mail provider publishes SPF records.


SPF increases the probability of spam being rejected at the smtp
level at MX servers, so my expectation would be that it would exacerbate
backscatter not improve it.

Many people recommend SPF for backscatter, but I've yet to hear a cogent
argument for why it helps beyond the very optimistic hope that spammers
will check that their spam is spf compliant.


I feel the same way and thanks for adding some humor to the situation.

ed


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"



___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp

Yury Michurin <[EMAIL PROTECTED]> escribió:


Hello,
start with putting spf record on the domain,
http://www.netdummy.net/stop-bounce-mail.html
and finish with filtering bogus message-id wich was not orignated on your
server with whatever software you using.


I've had the spf record for a couple of years and I've started  
filtering.  I guess I was just looking for something different.


Thanks for helping me adapt to the real world.

ed



Regards,
Yury

On Thu, Oct 16, 2008 at 4:01 PM, <[EMAIL PROTECTED]> wrote:


In the last hour, I've received over 200 legitimate bounce messages from
email services as a result of someone having used or worse is using my email
address in spam from multiple windows machines and ip addresses.  The end
result is that I am getting the bounce messages.  I'm sure that others on
this list have experienced the problem and maybe have a solution that I
don't have.

The messages are allowed through my obspamd/pf and pf smtp bruteforce
blocking rules because they are completely legit.

I guess the work around is to filter them on incoming together with our
local bounce messaages util the spammers get tired of my address.

Thanks for any suggestions,

ed
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "
[EMAIL PROTECTED]"





___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread RW
On Thu, 16 Oct 2008 08:54:55 -0700 (PDT)
Luke Dean <[EMAIL PROTECTED]> wrote:

> 
> 
> On Thu, 16 Oct 2008, Matthew Seaman wrote:
> 
> > Until the wonderful day that the entire internet abides by these
> > rules[*], use
> > of technologies like SPF and DKIM can discourage but not entirely
> > prevent the spammers from joe-jobbing you.
> 
> I just started getting these bouncebacks en masse this week.
> My mail provider publishes SPF records.

SPF increases the probability of spam being rejected at the smtp
level at MX servers, so my expectation would be that it would exacerbate
backscatter not improve it. 

Many people recommend SPF for backscatter, but I've yet to hear a cogent
argument for why it helps beyond the very optimistic hope that spammers
will check that their spam is spf compliant. 

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD RELENG_7 scsi and usb, usb disks take precedence

2008-10-16 Thread Dan Nelson
In the last episode (Oct 16), Eric Masson said:
> "Svein Skogen (List Mail Account)" <[EMAIL PROTECTED]> writes:
> > With all due respect, if sysinstall isn't able to write those labels,
> > this is hardly the solution to the problem...  ;)
> 
> Sysinstall, even if it has proven to be useful, is outdated in many
> respects, it doesn't cope really well with GEOM or ZFS for example.
> 
> Using GEOM labels ensure that fstab will always be consistent, so
> *this is* a solution.
> 
> Now, you can try to patch the kernel to make it probe devices in a
> predefined & sorted order, but I guess it will be much more difficult
> ;)

No patching needed.  You can wire down the unit number of your scsi bus
and drive with boot hints as described in the scsi(4) manpage.  Wire
the adaptec card down as scbus0, and wire the device at scbus0.0 down
as da0.

-- 
Dan Nelson
[EMAIL PROTECTED]
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Bill Campbell
On Thu, Oct 16, 2008, [EMAIL PROTECTED] wrote:
> In the last hour, I've received over 200 legitimate bounce messages from 
> email services as a result of someone having used or worse is using my 
> email address in spam from multiple windows machines and ip addresses.  
> The end result is that I am getting the bounce messages.  I'm sure that 
> others on this list have experienced the problem and maybe have a 
> solution that I don't have.

Did these come from Barracuda boxes?

Blowback like this is hardly new or legitimate as the From and Sender
header addresses are often (usually) forged in spam, and it does not do
anything useful to reply to them.  The forged addresses may just be
something scraped from the address book of a machine running the Microsoft
virus, Windows, or a deliberate ``Joe Job'' where a spammer is targeting
somebody who may have caused them problems.

Bill
-- 
INTERNET:   [EMAIL PROTECTED]  Bill Campbell; Celestial Software LLC
URL: http://www.celestial.com/  PO Box 820; 6641 E. Mercer Way
Voice:  (206) 236-1676  Mercer Island, WA 98040-0820
Fax:(206) 232-9186

Common sense is genius dressed in its working clothes.
  -- Ralph Waldo Emerson
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: new hdd numeration after mainboard change

2008-10-16 Thread Marco
Thank you very much, of course it was the AHCI configuration in the
BIOS, luckily i can now switch between AHCI and compatibility mode when
using Windows(otherwise it will result in a bluescreen) ;-)

Best regards,
 Marco

Josh Paetzel wrote:
> Jeremy Chadwick wrote:
> > On Mon, Oct 13, 2008 at 07:12:20PM +0200, [EMAIL PROTECTED] wrote:
> >> i run "FreeBSD  7.1-PRERELEASE" i had a change of the mainboard of my
> >> lenovo notebook t60. after reboot the harddisk which was before
> >> recognized as "ad0" is now "ad4". i cannot find any other devices, no
> >> ad0/ad1/ad2 in /dev. even in the dmesg only ad4
> > The T60 is a laptop.  It only has one hard disk -- so I'm not sure why
> > you were seeing ad0, ad1, ad2 in the past.  You shouldn't have been,
> > unless you had 3 hard disks hooked up somehow.
>
> > The bottom line here is this: absolutely *nothing* requires the device
> > numbering to start at zero.  And this is definitely the case.
>
> >> does fbsd create a uniqe identifier for harddisks in combination with
> >> the motherboard or something like that?  where can i dig further into
> >> that issue?
> > It's not really an "issue".  Very likely your computer has toggled some
> > BIOS settings.
>
> > The T60 series has the ability to run the SATA ports in two modes: AHCI,
> > or Enhanced/Compatible.  Chances are before the motherboard swap, yours
> > was running in the opposite mode that it is now.
>
> > I would highly recommend using the AHCI mode.  It works quite well with
> > FreeBSD under Intel controllers.  Turn AHCI on (if it's not already),
> > and do not mess with it.
>
>
> I can verify as a T60 owner, if you toggle the BIOS between AHCI and
> "Compatability" the hard drive will show up as either ad4 or ad0.
>
> It works fine in either mode with FreeBSD.  Unless you are running
> another OS that doesn't have SATA support there's really no reason to
> use compatibility mode
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Luke Dean



On Thu, 16 Oct 2008, Matthew Seaman wrote:

Until the wonderful day that the entire internet abides by these rules[*], 
use

of technologies like SPF and DKIM can discourage but not entirely prevent the
spammers from joe-jobbing you.


I just started getting these bouncebacks en masse this week.
My mail provider publishes SPF records.
If the names and numbers in the bouceback messages are to be believed, 
however, the spammers have defeated SPF by hijacking DNS.  The poor 
recipients never see my SPF records because they're looking at the wrong 
IP address.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Per olof Ljungmark

Daniel Bye wrote:

On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:

It is possible to configure sudo to run only exactly the required command
(including arguments) precisely to guard against this type of abuse -
I use it extensively in my own nagios setup.

This Cmnd_Alias in sudoers will do the trick:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0

man sudoers for more information about what you can do with sudo.


I just realised this example is woefully incomplete - apologies for that.

There are a few ways you can set up /usr/local/etc/sudoers (make sure
you use visudo to edit it, as it will catch any syntax errors for you,
thus helping somewhat to prevent breaking your setup).

The simplest case will just be to allow nagios to run the command, as root,
without a password:

nagios ALL=(root) NOPASSWD: /sbin/camcontrol inquiry da0

If, as is quite possible, nagios should be able to run more than just
that one command, you can define a Cmnd_Alias, as above. To include more
than one command in the alias, simply separate them with a comma. You
can use `\' to escape newlines and make your file a little easier to read:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0 \
  /sbin/camcontrol inquiry da1

and so on. Now, to use that alias, set the user's permissions to

nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS

The sudoers man page has more information, and there is also a good
tutorial by M Lucas on O'Reilly's Big Scary Daemons (it's from 2002, but
still a good introduction):


Thank you very much for the detailed information.

I will have a go at sudo while waiting for my collegue to return, he 
knows C and could probably write up the wrapper that Jeremy suggested.


Thanks all for the tips!

--per
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Matthew Seaman

-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Jeremy Chadwick wrote:
| On Thu, Oct 16, 2008 at 09:01:02AM -0500, [EMAIL PROTECTED] wrote:
|> In the last hour, I've received over 200 legitimate bounce messages from 
|> email services as a result of someone having used or worse is using my 
|> email address in spam from multiple windows machines and ip addresses.  
|> The end result is that I am getting the bounce messages.  I'm sure that 
|> others on this list have experienced the problem and maybe have a 
|> solution that I don't have.

|>
|> The messages are allowed through my obspamd/pf and pf smtp bruteforce  
|> blocking rules because they are completely legit.

|>
|> I guess the work around is to filter them on incoming together with our 
|> local bounce messaages util the spammers get tired of my address.
| 
| The term coined for this type of mail is "backscatter".
| 
| There is no easy solution for this.  The backscatter article on

| postfix.org, for example, caused our mail servers to start rejecting
| mail that was generated from PHP scripts and CGIs on our own systems,
| which makes no sense.  The article:
| 
| http://www.postfix.org/BACKSCATTER_README.html
| 
| If the backscatter is all directed to a single Email address (rather

| than a series of addresses, e.g. [EMAIL PROTECTED], and
| you have [EMAIL PROTECTED] accepted), then a solution is to reject
| mail with an RCPT TO of an account or virtual address that does not
| exist on your machine.
| 
| This, of course, has a wonderful side effect: spammers now have a way to

| detect what Email addresses on your box legitimately accept mail, thus
| once they find one which never gets a bounceback, will start pounding
| that address to kingdom come.
| 
| Let me know if you do find a reliable, decent solution that does not

| involve SPF or postfix header_checks or body_checks.
| 


Although not a solution to the immediate problems experienced by the OP
in the long term, the most effective way to counter back-scatter spam is
for every operator of a mail server to adopt the following behaviour:

~   * Reject e-mails *only* during the initial SMTP dialogue -- ie. respond
~ with a 5xx error code.  No exceptions. This includes internal mail
~ submission of messages between users on the same system.

~   * Once your mail server has accepted a message for delivery, never
~ bounce it back to the sender as a result of spam or virus filtering
~ or for unknown destination address.  Just drop it in the bit-bucket
~ in these cases.

This means that your edge SMTP servers and all your MXes have to have an
accurate list of all of the valid e-mail accounts on your system so that
they can respond with 'user unknown' where required.

The point of rejecting messages only during the initial SMTP dialogue is
that at that point they are still the responsibility of the sending system.
Chances are if it's a compromised machine attempting to inject spam, it's 
not even going to attempt resending failed messages, or send bounce-o-grammes

on it's own behalf.

Unfortunately, building anything beyond a single-server mail system with these
characteristics is quite a lot harder than the simple-minded approach of
accepting anything address to your domain at the edge, and only bouncing at
the point of delivery to the mailbox.  Especially if your backup MXes are a
long way away from your main servers.

Until the wonderful day that the entire internet abides by these rules[*], use
of technologies like SPF and DKIM can discourage but not entirely prevent the
spammers from joe-jobbing you.

Cheers,

Matthew

[*] Unlikely to ever happen as technically they contradict the current RFCs.


- -- 
Dr Matthew J Seaman MA, D.Phil.   Flat 3

~  7 Priory Courtyard
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
~  Kent, CT11 9PW, UK
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (FreeBSD)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREDAAYFAkj3WogACgkQ3jDkPpsZ+VaqKwCeMPa4tGkwewH+l0EfgVwTvpmS
IKoAoJ1ec2WTSwBQRsYq6rNYWqQc6P2Y
=lFRk
-END PGP SIGNATURE-
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: error compiling linux-glib2

2008-10-16 Thread Boris Samorodov
Boris Samorodov <[EMAIL PROTECTED]> writes:

> # echo 'linux_enable="YES"' >> /etc/loader.conf

Sorry, I've mixed two variants. They are:
'linux_load="YES"' >> /boot/loader.conf
'inux_enable="YES"' >> /etc/rc.conf[.local]

> # reboot

WBR
-- 
Boris Samorodov (bsam)
Research Engineer, http://www.ipt.ru Telephone & Internet SP
FreeBSD committer, http://www.FreeBSD.org The Power To Serve
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Auto Backup Data and Delete for Account Expired

2008-10-16 Thread Lowell Gilbert
Kalpin Erlangga Silaen <[EMAIL PROTECTED]> writes:

> is there any routines to check if some accounts expire then system would
> like to do backup all data to certain directory and then delete the account.

Have you look in the ports collection?
A quick search suggested that usermatic or dtc might help, but I'm
sure a more thorough search would bring up more possibilities.

-- 
Lowell Gilbert, embedded/networking software engineer, Boston area
http://be-well.ilk.org/~lowell/
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: open-vm-tools no more in ports

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 11:49:35AM -0300, [EMAIL PROTECTED] wrote:
> Hi all,
> 
>   This open-vm-tools isn't in 7.0 ports. Anyone know why? 

The ports tree does not have "versions", so I don't know what "7.0
ports" means for certain -- but I think you're saying "When I installed
FreeBSD 7.0 and I chose to install ports in the distributions I wanted,
there was no open-vm-tools".

Let's see if we can find out when it was added:

http://www.freebsd.org/cgi/cvsweb.cgi/ports/emulators/open-vm-tools/Makefile

...says March 28th of this year:

Revision 1.1
Fri Mar 28 13:30:31 2008 UTC (6 months, 2 weeks ago) by mbr

Please update your ports tree using csup.  And if you DID install a
copy of the ports tree during your FreeBSD install, you need to be
aware that you must "adopt" the tree.  The "adoption" process is
described on the CVSup site, but applies to the csup tool as well.

http://www.cvsup.org/faq.html#caniadopt

Also note this applies to "src", if you installed that too.

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 09:01:02AM -0500, [EMAIL PROTECTED] wrote:
> In the last hour, I've received over 200 legitimate bounce messages from 
> email services as a result of someone having used or worse is using my 
> email address in spam from multiple windows machines and ip addresses.  
> The end result is that I am getting the bounce messages.  I'm sure that 
> others on this list have experienced the problem and maybe have a 
> solution that I don't have.
>
> The messages are allowed through my obspamd/pf and pf smtp bruteforce  
> blocking rules because they are completely legit.
>
> I guess the work around is to filter them on incoming together with our 
> local bounce messaages util the spammers get tired of my address.

The term coined for this type of mail is "backscatter".

There is no easy solution for this.  The backscatter article on
postfix.org, for example, caused our mail servers to start rejecting
mail that was generated from PHP scripts and CGIs on our own systems,
which makes no sense.  The article:

http://www.postfix.org/BACKSCATTER_README.html

If the backscatter is all directed to a single Email address (rather
than a series of addresses, e.g. [EMAIL PROTECTED], and
you have [EMAIL PROTECTED] accepted), then a solution is to reject
mail with an RCPT TO of an account or virtual address that does not
exist on your machine.

This, of course, has a wonderful side effect: spammers now have a way to
detect what Email addresses on your box legitimately accept mail, thus
once they find one which never gets a bounceback, will start pounding
that address to kingdom come.

Let me know if you do find a reliable, decent solution that does not
involve SPF or postfix header_checks or body_checks.

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


open-vm-tools no more in ports

2008-10-16 Thread scuba
Hi all,

This open-vm-tools isn't in 7.0 ports. Anyone know why? 

On Wed, 3 Sep 2008, John Nielsen wrote:

|On Wednesday 03 September 2008, B. Cook wrote:
|> I am setting up FreeBSD 7.0 and he is asking about the vmware-tools.
|>
|> Ports has some things, but I am not sure what I need, and neither is he.
|>
|> Can anyone tell me what it needs?
|
|I usually create VM's with the Intel gigabit vNIC's which can use 
|FreeBSD's "em" driver. Since Xorg includes the vmmouse and vmware video 
|drivers already, the main things you should be looking for are the 
|memory "balloon" driver and the guestd service. In the past I have gotten 
|these to work by using the supplied tools (on the CD image that 
|is "inserted" when you select "Install VMware tools" from the host). 
|However it is much easier nowadays to use the free version in 
|ports/emulators/open-vm-tools (or open-vm-tools-nox11).
|
|JN
|___
|freebsd-questions@freebsd.org mailing list
|http://lists.freebsd.org/mailman/listinfo/freebsd-questions
|To unsubscribe, send any mail to "[EMAIL PROTECTED]"
|


- Marcelo

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD RELENG_7 scsi and usb, usb disks take precedence

2008-10-16 Thread Eric Masson
"Svein Skogen (List Mail Account)" <[EMAIL PROTECTED]>
writes:

Hi,

> With all due respect, if sysinstall isn't able to write those labels,
> this is hardly the solution to the problem...  ;)

Sysinstall, even if it has proven to be useful, is outdated in many
respects, it doesn't cope really well with GEOM or ZFS for example.

Using GEOM labels ensure that fstab will always be consistent, so *this
is* a solution.

Now, you can try to patch the kernel to make it probe devices in a
predefined & sorted order, but I guess it will be much more difficult ;)

-- 
 Car en normandie nous aimons beaucoup le jeu du saute-moutons. Et
 j'interdis ici les parisiens centralistes et snobinards de profiter de
 cet aveu pour briller d'un calembour à tendance zoophile et bocagophobe
 -+- LC in www.le-gnu.net - Sauter n'est pas jouir -+-

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Paul Schmehl

--On Thursday, October 16, 2008 09:01:02 -0500 [EMAIL PROTECTED] wrote:



In the last hour, I've received over 200 legitimate bounce messages
from email services as a result of someone having used or worse is
using my email address in spam from multiple windows machines and ip
addresses.  The end result is that I am getting the bounce messages.
I'm sure that others on this list have experienced the problem and
maybe have a solution that I don't have.

The messages are allowed through my obspamd/pf and pf smtp bruteforce
blocking rules because they are completely legit.

I guess the work around is to filter them on incoming together with
our local bounce messaages util the spammers get tired of my address.



We call those "bounceback spam".  The only solution that I know of is to tag 
all outgoing messages with a special header and then check for that header on 
all returns and reject those that don't contain the header.  All legitimate 
bounces would contain the header because they originated with your MTA.


E.g. X-Bounceback-Check: 0987923874

The value of the header can be anything you want it to be, and you can change 
it periodically if you want to keep statistical data.


--
Paul Schmehl ([EMAIL PROTECTED])
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: error compiling linux-glib2

2008-10-16 Thread Boris Samorodov
Warren Liddell <[EMAIL PROTECTED]> writes:

> Running FreeBSD 7.1-PreRelease, AMD64 KDE 4.1.2
>
>
>
> ===>  Checking if devel/linux-glib2 already installed
> cd /usr/ports/devel/linux-glib2/work && /usr/bin/find * -type d -exec
> /bin/mkdir -p "/compat/linux/{}" \;
> cd /usr/ports/devel/linux-glib2/work && /usr/bin/find * ! -type d |
> /usr/bin/cpio -pm -R root:wheel /compat/linux
> 3914 blocks
> ===>   Running linux ldconfig
> /compat/linux/sbin/ldconfig -r /compat/linux
> ELF binary type "3" not known.

# kldload linux
And/or:
# echo 'linux_enable="YES"' >> /etc/loader.conf
# reboot

> /compat/linux/sbin/ldconfig: 1: Syntax error: "(" unexpected
> *** Error code 2
>
> Stop in /usr/ports/devel/linux-glib2.
> *** Error code 1
>
> Stop in /usr/ports/devel/linux-glib2.


WBR
-- 
bsam
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread Yury Michurin
Hello,
start with putting spf record on the domain,
http://www.netdummy.net/stop-bounce-mail.html
and finish with filtering bogus message-id wich was not orignated on your
server with whatever software you using.

Regards,
Yury

On Thu, Oct 16, 2008 at 4:01 PM, <[EMAIL PROTECTED]> wrote:

> In the last hour, I've received over 200 legitimate bounce messages from
> email services as a result of someone having used or worse is using my email
> address in spam from multiple windows machines and ip addresses.  The end
> result is that I am getting the bounce messages.  I'm sure that others on
> this list have experienced the problem and maybe have a solution that I
> don't have.
>
> The messages are allowed through my obspamd/pf and pf smtp bruteforce
> blocking rules because they are completely legit.
>
> I guess the work around is to filter them on incoming together with our
> local bounce messaages util the spammers get tired of my address.
>
> Thanks for any suggestions,
>
> ed
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "
> [EMAIL PROTECTED]"
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


I've just found a new and interesting spam source - legitimate bounce messages

2008-10-16 Thread eculp
In the last hour, I've received over 200 legitimate bounce messages  
from email services as a result of someone having used or worse is  
using my email address in spam from multiple windows machines and ip  
addresses.  The end result is that I am getting the bounce messages.   
I'm sure that others on this list have experienced the problem and  
maybe have a solution that I don't have.


The messages are allowed through my obspamd/pf and pf smtp bruteforce  
blocking rules because they are completely legit.


I guess the work around is to filter them on incoming together with  
our local bounce messaages util the spammers get tired of my address.


Thanks for any suggestions,

ed
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Radius Authentication

2008-10-16 Thread MattAD

I would just like to know if anyone on earth has been able to get the
pam_radius module working on FreeBSD, using a windows domain username
through ssh... ??? This has become a mystery to me. My /etc/pam.d/sshd
config looks like so:  

#
# $FreeBSD: src/etc/pam.d/sshd,v 1.16 2007/06/10 18:57:20 yar Exp $
#
# PAM configuration for the "sshd" service
#

# auth
authrequiredpam_nologin.so  no_warn
authsufficient  pam_opie.so no_warn
no_fake_prompts
authrequisite   pam_opieaccess.so   no_warn allow_local
authsufficient  pam_radius.so   no_warn
try_first_pass
#auth   sufficient  pam_krb5.so no_warn
try_first_pass
#auth   sufficient  pam_ssh.so  no_warn
try_first_pass
authsufficient  pam_unix.so no_warn
try_first_pass

# account
account requiredpam_nologin.so
#accountrequiredpam_krb5.so
account requiredpam_login_access.so
account requiredpam_unix.so

# session
#sessionoptionalpam_ssh.so
session requiredpam_permit.so

# password
#password   sufficient  pam_krb5.so no_warn
try_first_pass
passwordrequiredpam_unix.so no_warn
try_first_pass


:confused:
-- 
View this message in context: 
http://www.nabble.com/Radius-Authentication-tp20013780p20013780.html
Sent from the freebsd-questions mailing list archive at Nabble.com.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Daniel Bye
On Thu, Oct 16, 2008 at 12:05:01PM +0100, Daniel Bye wrote:
> It is possible to configure sudo to run only exactly the required command
> (including arguments) precisely to guard against this type of abuse -
> I use it extensively in my own nagios setup.
> 
> This Cmnd_Alias in sudoers will do the trick:
> 
> Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0
> 
> man sudoers for more information about what you can do with sudo.

I just realised this example is woefully incomplete - apologies for that.

There are a few ways you can set up /usr/local/etc/sudoers (make sure
you use visudo to edit it, as it will catch any syntax errors for you,
thus helping somewhat to prevent breaking your setup).

The simplest case will just be to allow nagios to run the command, as root,
without a password:

nagios ALL=(root) NOPASSWD: /sbin/camcontrol inquiry da0

If, as is quite possible, nagios should be able to run more than just
that one command, you can define a Cmnd_Alias, as above. To include more
than one command in the alias, simply separate them with a comma. You
can use `\' to escape newlines and make your file a little easier to read:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0 \
  /sbin/camcontrol inquiry da1

and so on. Now, to use that alias, set the user's permissions to

nagios ALL=(root) NOPASSWD: NAGIOS_CMNDS

The sudoers man page has more information, and there is also a good
tutorial by M Lucas on O'Reilly's Big Scary Daemons (it's from 2002, but
still a good introduction):

http://www.onlamp.com/pub/a/bsd/2002/08/29/Big_Scary_Daemons.html?page=1

Dan

-- 
Daniel Bye
 _
  ASCII ribbon campaign ( )
 - against HTML, vCards and  X
- proprietary attachments in e-mail / \


pgputr2fYSiXj.pgp
Description: PGP signature


Re: FreeBSD RELENG_7 scsi and usb, usb disks take precedence

2008-10-16 Thread Eric Masson
"Svein Skogen (List Mail Account)" <[EMAIL PROTECTED]>
writes:

Hi,

> Is there any way to tell FreeBSD permanently "I want my adaptec
> controller's scsi chain to be the first, no matter what USB devices you
> find"?

You can circumvent this behaviour by using GEOM labels :
http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/geom-glabel.html

Regards

-- 
 CE>Je ne sais pas si vous etes la personne adequat mais il y a un
 CE>"dégénéré mental " qui veut enculer tous le monde sur frsf
 > ne vous inquiétez pas, ce n'est pas possible via Usenet :)
 -+-LW in Guide du Neuneu Usenet - Après les mouches, à qui le tour ? -+-

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Kopete and KDE4.1

2008-10-16 Thread Warren Liddell

Sdävtaker wrote:

Did someone make kopete work in kde4.1 with msn and jabber networks?
I tried a couple of recipes i found gogling, but nothing worked.
Any ideas?
Im running FBSD7.0 x64
Any info is appreciated, thanks!
Sdav
  
Try doing the following .. although for me it dosent compile, but it 
used to work to get kopete to work with MSN.


> >> Yes, thanks for your hint; here is what I did exactly this morning:
> >>
> >> # cd /usr/ports/net/kdenetwork4
> >> # make
> >>
> >> [Ctrl-C iterrupt the proc after all configuration is done]
> >>
> >> # cd /usr/ports/net/kdenetwork4/work
> >> # svn co svn://anonsvn.kde.org/home/kde/trunk/KDE/kdenetwork
> >>...
> >> A  
> >> kdenetwork/kget/transfer-

> > plugins/bittorrent/libbtcore/util/autorotatelogjob
> >> .h Akdenetwork/kget/transfer-
> > plugins/bittorrent/libbtcore/util/error.cpp
> >> Checked out external at revision 850250.
> >> Checked out revision 850250.
> >>
> >> # mv kdenetwork-4.1.2 kdenetwork-4.1.2.portversion
> >> # mv kdenetwork kdenetwork-4.1.2
> >> # cp -rp kdenetwork-4.1.2.portversion/build kdenetwork-4.1.2
> >>
> >> # make
> >> # make deinstall
> >> # make reinstall
> >>
> >> after this kopete's version is really 0.60.80 and it works with MSN;
> >>
> >> btw: the version string comes from:
> >>
> >> kopete/libkopete/kopeteversion.h:#define KOPETE_VERSION_STRING
> > "0.60.80"
> >> thx aganin; maybe it's worth to build a new file
> >> KDE/kdenetwork-4.1.2.tar.bz2 and update this port;
> >>
> >>matthias
> >
> > I builded success use this way ,kopete can login msn,version 0.6.80
> >
> > But step for my used have a little different ;-)
> >
> > # cd   /usr/ports/net/kdenetwork4
> > # make extract
> > # cd  work
> > # svn co svn://anonsvn.kde.org/home/kde/trunk/KDE/kdenetwork
> > # mv kdenetwork-4.1.2 kdenetwork-4.1.2.portversion
> > # mv kdenetwork kdenetwork-4.1.2
> > # cd  /usr/ports/net/kdenetwork4
> > # make FORCE_PKG_REGISTER=yes install clean
> >
> > whole compile and install is right,no error

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


error compiling linux-glib2

2008-10-16 Thread Warren Liddell

Running FreeBSD 7.1-PreRelease, AMD64 KDE 4.1.2



===>  Checking if devel/linux-glib2 already installed
cd /usr/ports/devel/linux-glib2/work && /usr/bin/find * -type d -exec 
/bin/mkdir -p "/compat/linux/{}" \;
cd /usr/ports/devel/linux-glib2/work && /usr/bin/find * ! -type d | 
/usr/bin/cpio -pm -R root:wheel /compat/linux

3914 blocks
===>   Running linux ldconfig
/compat/linux/sbin/ldconfig -r /compat/linux
ELF binary type "3" not known.
/compat/linux/sbin/ldconfig: 1: Syntax error: "(" unexpected
*** Error code 2

Stop in /usr/ports/devel/linux-glib2.
*** Error code 1

Stop in /usr/ports/devel/linux-glib2.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: How to get my Dad's Win2k system to access internet through my FreeBSD 6.2 system

2008-10-16 Thread Da Rock

On Thu, 2008-10-16 at 04:43 -0700, Jeremy Chadwick wrote:
> On Thu, Oct 16, 2008 at 09:29:04PM +1000, Da Rock wrote:
> > 
> > On Thu, 2008-10-16 at 06:54 -0400, Michael Powell wrote:
> > > Da Rock wrote:
> > > 
> > > [snip] 
> > > > I'm assuming the problem with double nat'ing is the confusion in packet
> > > > traffic. So if the OP is using his ADSL modem to connect to the net,
> > > > then it could be safe to assume the public IP would be to the modem
> > > > itself, and not his box (barring the possible use of USB), so then the
> > > > nat'ing would already be done. Therefore, the best and easiest way would
> > > > be to simply bridge his interfaces- correct? Less overheads, etc, plus
> > > > simplicity of setup.
> > > >
> > > 
> > > There is another option, a variant of which I use. My el cheapo deluxe DSL
> > > modem has really crappy broken firewall and DNS implementations. Wireshark
> > > showed Windows Messenger service spam leaking past and as soon as I saw
> > > that I assumed it was probably the tip of the iceberg.
> > > 
> > > You can also bridge the modem (disabling it's NAT as well). In a fully
> > > bridged configuration your FreeBSD gateway will have to perform PPPoE
> > > handshake and login as well. 
> > > 
> > 
> > Setting up the modem itself this way can be tricky at times, depending
> > on the model and the service. One gotcha with this method can be if your
> > ISP is using heartbeat, and so you'll have to either script yourself or
> > find one that suits.
> > 
> > > I use a second option called split-bridge, which they have named "IP
> > > Passthrough". This allows the DSL modem to be responsible for the PPPoE
> > > session. It works by passing the WAN public IP to the Internet facing NIC
> > > in my FreeBSD box via DHCP. So, while my interior LAN NIC is static, my
> > > outside NIC is ifconfig_xl0="DHCP". It gets assigned whatever IP Verizon
> > > sends.
> > > 
> > 
> > Is this also called IP spoofing?
> 
> No, this is **NOT** IP spoofing.
> 
> What Michael's describing is a feature many DSL modems offer.  There is
> no official term for what it is, since DSL modems are supposed to be
> bridges (layer 2 devices), but in fact this feature causes the modem to
> act like something that sits between layer 2 and layer 3 -- yet is not a
> router.  Different modems call it something different.
> 
> If you enable this feature, what happens is this:
> 
> The modem requires you to access its administrative web page.  You
> insert your PPPoE Username and Password (which it saves to
> NVRAM/EEPROM), and click Connect.  The DSL modem then continues to do
> the PPPoE encapsulation, so that your FreeBSD box, Windows box, or
> whatever (that's connected to the DSL modem on the LAN port) does not
> have to.
> 
> The modem is given an IP address as part of the PPPoE hand-off.  That IP
> address is, of course, a public Internet IP.  The modem also enables use
> of a DHCP server, so that a machine connect to its LAN port can do a
> DHCP request and get an IP address -- but here's the kicker.
> 
> The IP address the modem returns to the machine on the LAN is the
> public IP address the ISP gave the modem via PPPoE.
> 
> "So how does this work?"  All network I/O between the LAN port and
> the modem itself is done at layer 2 past that point -- meaning, the
> modem acts "almost purely" as a bridge from that point forward: but
> it still does the PPPoE encapsulation for you.  So, like I said,
> the modem acts like a device that sits between layer 2 and layer 3.
> 
> Does this make more sense?
> 
> The reason this feature is HIGHLY desired is because not all PPPoE
> implementations are compatible with an ISPs implementation.  It is
> *always* best to use whatever equipment they give you or guarantee
> works with them; using your own, or some other PPPoE daemon/method,
> can result in lots of trouble.
> 
> I've personally used this method, I might add.  I can give you
> reference material on how to set it up and use it, over at
> dslreports.com.  Lots of DSL modems these days offer said feature.

Ok, that explains it. The IP spoofing term comes from the Alcatel
SpeedTouch systems used by Telstra in Oz. If there is no official term
for it then thats why they've decided to call it that- right or wrong.
They use firmware updates to enable this feature or others, and can be
botched easily so for reference copy the original firmware as a backup
if possible!

It certainly would save trouble with their equipment because of the
heartbeat feature. Sounds very cool...

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


FreeBSD RELENG_7 scsi and usb, usb disks take precedence

2008-10-16 Thread Svein Skogen (List Mail Account)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I'm writing this, in hope that someone has a quick-and-dirty trick to
solve a minor problem I have.

My home server, running RELENG_7 is booting off a 10Krpm scsi drive,
connected to an adaptec controller. This device is /dev/da0. However,
should I accidentally reboot the server with ANY usb block device,
FreeBSD assumes that the USB controller is the first scsi chain in the
computer, and assigns the lower da numbers to the usb block devices,
placing the actual scsi disk as the last da device.

Is there any way to tell FreeBSD permanently "I want my adaptec
controller's scsi chain to be the first, no matter what USB devices you
find"?

If this is documented somewhere, feel free to point me to the correct
man page.

Regards,

Svein Skogen
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkj3Kl0ACgkQtVbTV+BEzaN0mACeJRcLvDU3W5mu7MUuQmL5Uqpt
5p8AnjcigRJQixlj2J5/WBqSmA2MdcDh
=R+MG
-END PGP SIGNATURE-
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: How to get my Dad's Win2k system to access internet through my FreeBSD 6.2 system

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 09:29:04PM +1000, Da Rock wrote:
> 
> On Thu, 2008-10-16 at 06:54 -0400, Michael Powell wrote:
> > Da Rock wrote:
> > 
> > [snip] 
> > > I'm assuming the problem with double nat'ing is the confusion in packet
> > > traffic. So if the OP is using his ADSL modem to connect to the net,
> > > then it could be safe to assume the public IP would be to the modem
> > > itself, and not his box (barring the possible use of USB), so then the
> > > nat'ing would already be done. Therefore, the best and easiest way would
> > > be to simply bridge his interfaces- correct? Less overheads, etc, plus
> > > simplicity of setup.
> > >
> > 
> > There is another option, a variant of which I use. My el cheapo deluxe DSL
> > modem has really crappy broken firewall and DNS implementations. Wireshark
> > showed Windows Messenger service spam leaking past and as soon as I saw
> > that I assumed it was probably the tip of the iceberg.
> > 
> > You can also bridge the modem (disabling it's NAT as well). In a fully
> > bridged configuration your FreeBSD gateway will have to perform PPPoE
> > handshake and login as well. 
> > 
> 
> Setting up the modem itself this way can be tricky at times, depending
> on the model and the service. One gotcha with this method can be if your
> ISP is using heartbeat, and so you'll have to either script yourself or
> find one that suits.
> 
> > I use a second option called split-bridge, which they have named "IP
> > Passthrough". This allows the DSL modem to be responsible for the PPPoE
> > session. It works by passing the WAN public IP to the Internet facing NIC
> > in my FreeBSD box via DHCP. So, while my interior LAN NIC is static, my
> > outside NIC is ifconfig_xl0="DHCP". It gets assigned whatever IP Verizon
> > sends.
> > 
> 
> Is this also called IP spoofing?

No, this is **NOT** IP spoofing.

What Michael's describing is a feature many DSL modems offer.  There is
no official term for what it is, since DSL modems are supposed to be
bridges (layer 2 devices), but in fact this feature causes the modem to
act like something that sits between layer 2 and layer 3 -- yet is not a
router.  Different modems call it something different.

If you enable this feature, what happens is this:

The modem requires you to access its administrative web page.  You
insert your PPPoE Username and Password (which it saves to
NVRAM/EEPROM), and click Connect.  The DSL modem then continues to do
the PPPoE encapsulation, so that your FreeBSD box, Windows box, or
whatever (that's connected to the DSL modem on the LAN port) does not
have to.

The modem is given an IP address as part of the PPPoE hand-off.  That IP
address is, of course, a public Internet IP.  The modem also enables use
of a DHCP server, so that a machine connect to its LAN port can do a
DHCP request and get an IP address -- but here's the kicker.

The IP address the modem returns to the machine on the LAN is the
public IP address the ISP gave the modem via PPPoE.

"So how does this work?"  All network I/O between the LAN port and
the modem itself is done at layer 2 past that point -- meaning, the
modem acts "almost purely" as a bridge from that point forward: but
it still does the PPPoE encapsulation for you.  So, like I said,
the modem acts like a device that sits between layer 2 and layer 3.

Does this make more sense?

The reason this feature is HIGHLY desired is because not all PPPoE
implementations are compatible with an ISPs implementation.  It is
*always* best to use whatever equipment they give you or guarantee
works with them; using your own, or some other PPPoE daemon/method,
can result in lots of trouble.

I've personally used this method, I might add.  I can give you
reference material on how to set it up and use it, over at
dslreports.com.  Lots of DSL modems these days offer said feature.

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: How to get my Dad's Win2k system to access internet through my FreeBSD 6.2 system

2008-10-16 Thread Da Rock

On Thu, 2008-10-16 at 06:54 -0400, Michael Powell wrote:
> Da Rock wrote:
> 
> [snip] 
> > I'm assuming the problem with double nat'ing is the confusion in packet
> > traffic. So if the OP is using his ADSL modem to connect to the net,
> > then it could be safe to assume the public IP would be to the modem
> > itself, and not his box (barring the possible use of USB), so then the
> > nat'ing would already be done. Therefore, the best and easiest way would
> > be to simply bridge his interfaces- correct? Less overheads, etc, plus
> > simplicity of setup.
> >
> 
> There is another option, a variant of which I use. My el cheapo deluxe DSL
> modem has really crappy broken firewall and DNS implementations. Wireshark
> showed Windows Messenger service spam leaking past and as soon as I saw
> that I assumed it was probably the tip of the iceberg.
> 
> You can also bridge the modem (disabling it's NAT as well). In a fully
> bridged configuration your FreeBSD gateway will have to perform PPPoE
> handshake and login as well. 
> 

Setting up the modem itself this way can be tricky at times, depending
on the model and the service. One gotcha with this method can be if your
ISP is using heartbeat, and so you'll have to either script yourself or
find one that suits.

> I use a second option called split-bridge, which they have named "IP
> Passthrough". This allows the DSL modem to be responsible for the PPPoE
> session. It works by passing the WAN public IP to the Internet facing NIC
> in my FreeBSD box via DHCP. So, while my interior LAN NIC is static, my
> outside NIC is ifconfig_xl0="DHCP". It gets assigned whatever IP Verizon
> sends.
> 

Is this also called IP spoofing?

> I just like this particular arrangement better. I run a caching/hybrid DNS
> server on the gateway as well. I've used this configuration for about 2
> years now and it has served me well. I also use ALTQ to prioritize outgoing
> acks, as this seems to be helpful when using asymmetric DSL.
>  

Sounds very stable- I might have to look into the ALTQ (one day, when I
finally get through my other projects... :) ).

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Breach of Contract Reported for FREEBSD.ORG

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 07:15:35AM -0400, Michael Powell wrote:
> David G Lawrence wrote:
> 
> >> Dear Customer,
> >> 
> >> It has been brought to our attention that some or all of the information
> >> associated with your domain name FREEBSD.ORG is outdated or incorrect.
> >> These types of complaints are brought to our attention in one of two
> >> ways.
> >> 
> >> The most common type of complaint is received from the Internet
> >> Corporation for Assigned Names and Numbers (ICANN). ICANN is the
> >> non-profit corporation responsible for accrediting domain name
> >> registrars. ICANN requires domain name registration customers to keep
> >> their account information current. ICANN mandates that outdated contact
> >> information can be grounds for domain name cancellation.
> > 
> > Michelle,
> > 
> >The registration information for freebsd.org is correct. The only thing
> > that is out of date is one of the email addresses ([EMAIL PROTECTED]), 
> > which I
> > have tried to change, but have been unable to due to a problem with the
> > Network Solutions website.
> >I don't know who reported that the information was incorrect, but they
> > are mistaken. I will additionally follow up in the other ways mentioned
> > in your message.
> > 
> [snip]
> 
> ICANN requires registrars to verify the domain info once a year. I just went
> through this with GoDaddy. I think the registrars see this as an
> opportunity to market services. Different registrars bungle their marketing
> effort in different ways. GoDaddy sent me instructions on what to do in
> order to correct errors, but had absolutely nothing on how to proceed if
> the information was correct. So I viewed this as something they could take
> advantage of in order to get me to their site for a "hard sell" campaign.

So how do you folks who comply with ICANN's requirement deal with this?
http://blog.forret.com/2004/12/domain-registry-of-america-scam/ -- This
organisation is now known as "Domain Renewal Group", by the way.

I'm quite interested in knowing; it might be tolerable if you've only
one domain, but if you're a hosting provider and have 100?

Let me know.

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Breach of Contract Reported for FREEBSD.ORG

2008-10-16 Thread Michael Powell
David G Lawrence wrote:

>> Dear Customer,
>> 
>> It has been brought to our attention that some or all of the information
>> associated with your domain name FREEBSD.ORG is outdated or incorrect.
>> These types of complaints are brought to our attention in one of two
>> ways.
>> 
>> The most common type of complaint is received from the Internet
>> Corporation for Assigned Names and Numbers (ICANN). ICANN is the
>> non-profit corporation responsible for accrediting domain name
>> registrars. ICANN requires domain name registration customers to keep
>> their account information current. ICANN mandates that outdated contact
>> information can be grounds for domain name cancellation.
> 
> Michelle,
> 
>The registration information for freebsd.org is correct. The only thing
> that is out of date is one of the email addresses ([EMAIL PROTECTED]), which I
> have tried to change, but have been unable to due to a problem with the
> Network Solutions website.
>I don't know who reported that the information was incorrect, but they
> are mistaken. I will additionally follow up in the other ways mentioned
> in your message.
> 
[snip]

ICANN requires registrars to verify the domain info once a year. I just went
through this with GoDaddy. I think the registrars see this as an
opportunity to market services. Different registrars bungle their marketing
effort in different ways. GoDaddy sent me instructions on what to do in
order to correct errors, but had absolutely nothing on how to proceed if
the information was correct. So I viewed this as something they could take
advantage of in order to get me to their site for a "hard sell" campaign.

-Mike
  


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 09:17:58PM +1100, Edwin Groothuis wrote:
> > The nrpe daemon that handles the script runs as the "nagios" user and
> > the command needed is camcontrol:
> 
> First lines of the check_ciss.sh command:
> 
> #!/bin/sh
> 
> if [ $(whoami) != "root" ]; then
>   sudo $*
> fi
> 
> And allow in sudoerrs.conf the nagios user to run the check_ciss.sh
> command without passwords.
> 
> Works fine here for years :-)

Wow... all I can say.  Wow.  This is a *humongous* security hole.

So what happens when someone finds a security hole in Nagios, allowing
them to modify files or run checks with arguments of their choice?

For a good time:

check_ciss.sh camcontrol format da0 -y

Yeah, uh, that script should be nuked.

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Daniel Bye
On Thu, Oct 16, 2008 at 01:04:52AM -0700, Jeremy Chadwick wrote:
> On Thu, Oct 16, 2008 at 09:32:02AM +0200, Per olof Ljungmark wrote:
> > The nrpe daemon that handles the script runs as the "nagios" user and
> > the command needed is camcontrol:
> > 
> > camcontrol inquiry da0
> > 
> > The nagios user does not have a shell by default in FreeBSD:
> > nagios:*:181:181::0:0:Nagios pseudo-user:/var/spool/nagios:/usr/sbin/nologin
> > so the script will obviously fail.
> 
> I think the problem is probably more along the lines of: you can't
> run camcontrol as user "nagios", because root access is required to
> communicate with CAM (open /dev/xptX).
> 
> Two recommendations:
> 
> 1) Write wrapper program (this requires C) which calls "camcontrol
> inquiry da0".  The wrapper binary should be owned by root:nagios,
> and perms should be 4710 (so that individuals in the "nagios" group
> can run the binary, but no one else).  This C program is very, very
> simple.
> 
> 2) Use "sudo" and set up a ***VERY*** restrictive command list for user
> "nagios", meaning, only allowed to run /sbin/camcontrol.  I DO NOT
> recommend this method, as it's possible for someone to use nagios to
> run something like "camcontrol reset" or "camcontrol eject" as root,
> or even worse, "camcontrol cmd" (could induce a low-level format of
> one of your disks),

It is possible to configure sudo to run only exactly the required command
(including arguments) precisely to guard against this type of abuse -
I use it extensively in my own nagios setup.

This Cmnd_Alias in sudoers will do the trick:

Cmnd_Alias NAGIOS_CMNDS = /sbin/camcontrol inquiry da0

man sudoers for more information about what you can do with sudo.

Dan

-- 
Daniel Bye
 _
  ASCII ribbon campaign ( )
 - against HTML, vCards and  X
- proprietary attachments in e-mail / \


pgpeTPtDTfHCY.pgp
Description: PGP signature


Re: How to get my Dad's Win2k system to access internet through my FreeBSD 6.2 system

2008-10-16 Thread Michael Powell
Da Rock wrote:

[snip] 
> I'm assuming the problem with double nat'ing is the confusion in packet
> traffic. So if the OP is using his ADSL modem to connect to the net,
> then it could be safe to assume the public IP would be to the modem
> itself, and not his box (barring the possible use of USB), so then the
> nat'ing would already be done. Therefore, the best and easiest way would
> be to simply bridge his interfaces- correct? Less overheads, etc, plus
> simplicity of setup.
>

There is another option, a variant of which I use. My el cheapo deluxe DSL
modem has really crappy broken firewall and DNS implementations. Wireshark
showed Windows Messenger service spam leaking past and as soon as I saw
that I assumed it was probably the tip of the iceberg.

You can also bridge the modem (disabling it's NAT as well). In a fully
bridged configuration your FreeBSD gateway will have to perform PPPoE
handshake and login as well. 

I use a second option called split-bridge, which they have named "IP
Passthrough". This allows the DSL modem to be responsible for the PPPoE
session. It works by passing the WAN public IP to the Internet facing NIC
in my FreeBSD box via DHCP. So, while my interior LAN NIC is static, my
outside NIC is ifconfig_xl0="DHCP". It gets assigned whatever IP Verizon
sends.

I just like this particular arrangement better. I run a caching/hybrid DNS
server on the gateway as well. I've used this configuration for about 2
years now and it has served me well. I also use ALTQ to prioritize outgoing
acks, as this seems to be helpful when using asymmetric DSL.
 
[snip]

-Mike


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


FreeBSD and Nagios - permissions

2008-10-16 Thread Edwin Groothuis
> The nrpe daemon that handles the script runs as the "nagios" user and
> the command needed is camcontrol:

First lines of the check_ciss.sh command:

#!/bin/sh

if [ $(whoami) != "root" ]; then
sudo $*
fi

And allow in sudoerrs.conf the nagios user to run the check_ciss.sh
command without passwords.

Works fine here for years :-)

Edwin

-- 
Edwin Groothuis Website: http://www.mavetju.org/
[EMAIL PROTECTED]   Weblog:  http://www.mavetju.org/weblog/
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Ivailo Tanusheff
I think the problem is with the permisions of the specific user.
The way to get over it is to use sudo and configure it to allow the nagios 
user execute camcontrol. This way the line should be : sudo camcontrol 
inquiry da0

Regards,

Ivailo Tanusheff
Deputy Head of IT Department
ProCredit Bank (Bulgaria) AD





Per olof Ljungmark <[EMAIL PROTECTED]> 
Sent by: [EMAIL PROTECTED]
16.10.2008 10:52

To
freebsd-questions@freebsd.org
cc

Subject
FreeBSD and Nagios - permissions






Hi,

I'm implementing a shell script as a Nagios plugin to check the status
of the ciss(4) driver. However, there is a permission problem that I am
not sure about the best way to get around in FreeBSD (7-STABLE).

The nrpe daemon that handles the script runs as the "nagios" user and
the command needed is camcontrol:

camcontrol inquiry da0

The nagios user does not have a shell by default in FreeBSD:
nagios:*:181:181::0:0:Nagios 
pseudo-user:/var/spool/nagios:/usr/sbin/nologin
so the script will obviously fail.

I would assume there are several ways to get around this and would
welcome "best practice" suggestions on how.

Thanks,

--per
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to 
"[EMAIL PROTECTED]"

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Auto Backup Data and Delete for Account Expired

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 03:17:14PM +0700, Kalpin Erlangga Silaen wrote:
> Dear all,
> 
> is there any routines to check if some accounts expire then system would
> like to do backup all data to certain directory and then delete the account.
> 
> Any help would be appreciate.

You sent this mail to the list yesterday.  We saw it.

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Auto Backup Data and Delete for Account Expired

2008-10-16 Thread Kalpin Erlangga Silaen
Dear all,

is there any routines to check if some accounts expire then system would
like to do backup all data to certain directory and then delete the account.

Any help would be appreciate.

Thank you


Kalpin Erlangga Silaen

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD and Nagios - permissions

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 09:32:02AM +0200, Per olof Ljungmark wrote:
> Hi,
> 
> I'm implementing a shell script as a Nagios plugin to check the status
> of the ciss(4) driver. However, there is a permission problem that I am
> not sure about the best way to get around in FreeBSD (7-STABLE).
> 
> The nrpe daemon that handles the script runs as the "nagios" user and
> the command needed is camcontrol:
> 
> camcontrol inquiry da0
> 
> The nagios user does not have a shell by default in FreeBSD:
> nagios:*:181:181::0:0:Nagios pseudo-user:/var/spool/nagios:/usr/sbin/nologin
> so the script will obviously fail.

I cease to see what the users' shell has to do with the problem.  A
shell being set to /usr/sbin/nologin *does not* mean they cannot run
shell scripts, it just means one cannot log in as that user.

I think the problem is probably more along the lines of: you can't
run camcontrol as user "nagios", because root access is required to
communicate with CAM (open /dev/xptX).

> I would assume there are several ways to get around this and would
> welcome "best practice" suggestions on how.

Two recommendations:

1) Write wrapper program (this requires C) which calls "camcontrol
inquiry da0".  The wrapper binary should be owned by root:nagios,
and perms should be 4710 (so that individuals in the "nagios" group
can run the binary, but no one else).  This C program is very, very
simple.

2) Use "sudo" and set up a ***VERY*** restrictive command list for user
"nagios", meaning, only allowed to run /sbin/camcontrol.  I DO NOT
recommend this method, as it's possible for someone to use nagios to
run something like "camcontrol reset" or "camcontrol eject" as root,
or even worse, "camcontrol cmd" (could induce a low-level format of
one of your disks),

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


FreeBSD and Nagios - permissions

2008-10-16 Thread Per olof Ljungmark
Hi,

I'm implementing a shell script as a Nagios plugin to check the status
of the ciss(4) driver. However, there is a permission problem that I am
not sure about the best way to get around in FreeBSD (7-STABLE).

The nrpe daemon that handles the script runs as the "nagios" user and
the command needed is camcontrol:

camcontrol inquiry da0

The nagios user does not have a shell by default in FreeBSD:
nagios:*:181:181::0:0:Nagios pseudo-user:/var/spool/nagios:/usr/sbin/nologin
so the script will obviously fail.

I would assume there are several ways to get around this and would
welcome "best practice" suggestions on how.

Thanks,

--per
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: System lockup when out of space in /usr

2008-10-16 Thread Norberto Meijome
On Wed, 15 Oct 2008 06:14:24 +
[EMAIL PROTECTED] wrote:

> I personally have /usr/ports and /usr/src on their own "partitions". Easy to
> do and prevents lockups. 

right ... still doesn't solve my problem .

> Where is /usr currently mounted, on root(/)?

standard disk layout - /usr is a separate mount on / 

/dev/ad0s1a on / (ufs, local, noatime)
devfs on /dev (devfs, local)
/dev/ad0s1e on /tmp (ufs, local, noatime, soft-updates)
/dev/ad0s1f on /usr (ufs, local, noatime, soft-updates)
/dev/ad0s1d on /var (ufs, local, noatime, soft-updates)
procfs on /proc (procfs, local)
linprocfs on /usr/compat/linux/proc (linprocfs, local)
devfs on /var/named/dev (devfs, local)
/dev/md12.eli on /usr/home/betom/_2 (ufs, local, noatime, soft-updates)
/dev/md11.eli on /usr/home/betom/_3 (ufs, local, noatime, soft-updates)
/dev/md13.eli on /usr/home/betom/_1 (ufs, local, noatime, soft-updates)

IIRC, it may  also have happened when one of the GELI disks got full...

B
_
{Beto|Norberto|Numard} Meijome

"Build a system that even a fool can use, and only a fool will want to use it."
   George Bernard Shaw

I speak for myself, not my employer. Contents may be hot. Slippery when wet. 
Reading disclaimers makes you go blind. Writing them is worse. You have been 
Warned.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Interrupt storm detected on "irq10:"; throttling interrupt source

2008-10-16 Thread Jeremy Chadwick
On Thu, Oct 16, 2008 at 03:23:33PM +0800, nazir wrote:
> On Thu, Oct 16, 2008 at 12:20 PM, Jeremy Chadwick <[EMAIL PROTECTED]> wrote:
> > On Wed, Oct 15, 2008 at 06:17:56PM -0700, mdh wrote:
> >> --- On Wed, 10/15/08, nazir <[EMAIL PROTECTED]> wrote:
> >> > From: nazir <[EMAIL PROTECTED]>
> >> > Subject: Interrupt storm detected on "irq10:"; throttling interrupt 
> >> > source
> >> > To: freebsd-questions@freebsd.org
> >> > Date: Wednesday, October 15, 2008, 8:44 PM
> >> > Hi,
> >> >
> >> > I'm getting these on my HP-DL165 AMD Quad Qore
> >> >
> >> > interrupt storm detected on "irq10:"; throttling
> >> > interrupt source
> >>
> >> What is on IRQ 10?  You can determine this via the command:
> >> `dmesg |grep irq` then look for the line for IRQ 10 which specifies what 
> >> device is there.  It could be a driver problem, or it could be that the 
> >> hardware there is bunk.
> >> - mdh
> >
> > vmstat -i output would also come in handy here.
> 
> # vmstat -i
> interrupt  total   rate
> irq1: atkbd0  30  0
> irq10: ohci0 ohci+   8265418989
> irq33: mpt049348  5
> irq40: bge075482  9
> cpu0: timer 16431874   1968
> cpu2: timer 16424530   1967
> cpu3: timer 16424557   1967
> cpu1: timer 16424557   1967
> cpu4: timer 16424556   1967
> cpu6: timer 16424540   1967
> cpu7: timer 16424521   1967
> cpu5: timer 16424556   1967
> Total  139793969  16743

Can you provide full output of "dmesg"?  It appears you have an OCHI USB
controller that is going crazy with interrupts, but there may be
more devices attached to IRQ 10 which could be responsible (I think
that's what the "+" indicates).

-- 
| Jeremy Chadwickjdc at parodius.com |
| Parodius Networking   http://www.parodius.com/ |
| UNIX Systems Administrator  Mountain View, CA, USA |
| Making life hard for others since 1977.  PGP: 4BD6C0CB |

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Interrupt storm detected on "irq10:"; throttling interrupt source

2008-10-16 Thread nazir
On Thu, Oct 16, 2008 at 12:20 PM, Jeremy Chadwick <[EMAIL PROTECTED]> wrote:
> On Wed, Oct 15, 2008 at 06:17:56PM -0700, mdh wrote:
>> --- On Wed, 10/15/08, nazir <[EMAIL PROTECTED]> wrote:
>> > From: nazir <[EMAIL PROTECTED]>
>> > Subject: Interrupt storm detected on "irq10:"; throttling interrupt source
>> > To: freebsd-questions@freebsd.org
>> > Date: Wednesday, October 15, 2008, 8:44 PM
>> > Hi,
>> >
>> > I'm getting these on my HP-DL165 AMD Quad Qore
>> >
>> > interrupt storm detected on "irq10:"; throttling
>> > interrupt source
>>
>> What is on IRQ 10?  You can determine this via the command:
>> `dmesg |grep irq` then look for the line for IRQ 10 which specifies what 
>> device is there.  It could be a driver problem, or it could be that the 
>> hardware there is bunk.
>> - mdh
>
> vmstat -i output would also come in handy here.

# vmstat -i
interrupt  total   rate
irq1: atkbd0  30  0
irq10: ohci0 ohci+   8265418989
irq33: mpt049348  5
irq40: bge075482  9
cpu0: timer 16431874   1968
cpu2: timer 16424530   1967
cpu3: timer 16424557   1967
cpu1: timer 16424557   1967
cpu4: timer 16424556   1967
cpu6: timer 16424540   1967
cpu7: timer 16424521   1967
cpu5: timer 16424556   1967
Total  139793969  16743


> --
> | Jeremy Chadwickjdc at parodius.com |
> | Parodius Networking   http://www.parodius.com/ |
> | UNIX Systems Administrator  Mountain View, CA, USA |
> | Making life hard for others since 1977.  PGP: 4BD6C0CB |
>
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"